Mock Version: 0.9.14 Mock Version: 0.9.14 ENTER do(['bash', '--login', '-c', 'rpmbuild -bs --target x86_64 --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/centos6-rutgers-staging-build-2959-5083/root/', None, 86400, True, 0, 486, 495, None, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bs --target x86_64 --nodeps builddir/build/SPECS/nss.spec'] warning: Could not canonicalize hostname: opus5.rutgers.edu Building target platforms: x86_64 Building for target x86_64 Wrote: /builddir/build/SRPMS/nss-3.13.3-1.ru6.src.rpm Child returncode was: 0 LEAVE do --> ENTER do(['bash', '--login', '-c', 'rpmbuild -bb --target x86_64 --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/centos6-rutgers-staging-build-2959-5083/root/', None, 86400, True, 0, 486, 495, None, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bb --target x86_64 --nodeps builddir/build/SPECS/nss.spec'] Building target platforms: x86_64 Building for target x86_64 Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.2bVs42 + umask 022 + cd /builddir/build/BUILD + LANG=C + export LANG + unset DISPLAY + cd /builddir/build/BUILD + rm -rf nss-3.13.3 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-3.13.3-stripped.tar.bz2 + /bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.13.3 + /bin/chmod -Rf a+rX,u+w,g-w,o-w . + /bin/cp /builddir/build/SOURCES/PayPalEE.cert -f ./mozilla/security/nss/tests/libpkix/certs + cd /builddir/build/BUILD + cd nss-3.13.3 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-pem-20101125.tar.bz2 + /bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + /bin/chmod -Rf a+rX,u+w,g-w,o-w . + echo 'Patch #3 (renegotiate-transitional.patch):' Patch #3 (renegotiate-transitional.patch): + /bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -s -p0 -b --suffix .transitional --fuzz=0 + echo 'Patch #6 (nss-enable-pem.patch):' Patch #6 (nss-enable-pem.patch): + /bin/cat /builddir/build/SOURCES/nss-enable-pem.patch + /usr/bin/patch -s -p0 -b --suffix .libpem --fuzz=0 + echo 'Patch #7 (nsspem-642433.patch):' Patch #7 (nsspem-642433.patch): + /bin/cat /builddir/build/SOURCES/nsspem-642433.patch + /usr/bin/patch -s -p0 -b --suffix .642433 --fuzz=0 Patch #8 (0001-Bug-695011-PEM-logging.patch): + echo 'Patch #8 (0001-Bug-695011-PEM-logging.patch):' + /bin/cat /builddir/build/SOURCES/0001-Bug-695011-PEM-logging.patch + /usr/bin/patch -s -p1 -b --suffix .695011 --fuzz=0 Patch #16 (nss-539183.patch): + echo 'Patch #16 (nss-539183.patch):' + /bin/cat /builddir/build/SOURCES/nss-539183.patch + /usr/bin/patch -s -p0 -b --suffix .539183 --fuzz=0 Patch #18 (nss-646045.patch): + echo 'Patch #18 (nss-646045.patch):' + /bin/cat /builddir/build/SOURCES/nss-646045.patch + /usr/bin/patch -s -p0 -b --suffix .646045 --fuzz=0 Patch #20 (nsspem-createobject-initialize-pointer.patch): + echo 'Patch #20 (nsspem-createobject-initialize-pointer.patch):' + /bin/cat /builddir/build/SOURCES/nsspem-createobject-initialize-pointer.patch + /usr/bin/patch -s -p1 -b --suffix .717338 --fuzz=0 Patch #21 (0001-libnsspem-rhbz-734760.patch): + echo 'Patch #21 (0001-libnsspem-rhbz-734760.patch):' + /bin/cat /builddir/build/SOURCES/0001-libnsspem-rhbz-734760.patch + /usr/bin/patch -s -p1 -b --suffix .734760 --fuzz=0 Patch #22 (nsspem-init-inform-not-thread-safe.patch): + echo 'Patch #22 (nsspem-init-inform-not-thread-safe.patch):' + /bin/cat /builddir/build/SOURCES/nsspem-init-inform-not-thread-safe.patch + /usr/bin/patch -s -p0 -b --suffix .736410 --fuzz=0 Patch #25 (nsspem-use-system-freebl.patch): + echo 'Patch #25 (nsspem-use-system-freebl.patch):' + /bin/cat /builddir/build/SOURCES/nsspem-use-system-freebl.patch + /usr/bin/patch -s -p0 -b --suffix .systemfreebl --fuzz=0 Patch #26 (nofipstest.patch): + echo 'Patch #26 (nofipstest.patch):' + /bin/cat /builddir/build/SOURCES/nofipstest.patch + /usr/bin/patch -s -p0 -b --suffix .nofipstest --fuzz=0 Patch #28 (nsspem-bz754771.patch): + echo 'Patch #28 (nsspem-bz754771.patch):' + /bin/cat /builddir/build/SOURCES/nsspem-bz754771.patch + /usr/bin/patch -s -p0 -b --suffix .754771 --fuzz=0 Patch #29 (nss-ssl-cbc-random-iv-off-by-default.patch): + echo 'Patch #29 (nss-ssl-cbc-random-iv-off-by-default.patch):' + /bin/cat /builddir/build/SOURCES/nss-ssl-cbc-random-iv-off-by-default.patch + /usr/bin/patch -s -p0 -b --suffix .770682 --fuzz=0 Patch #30 (bz784672-protect-against-calls-before-nss_init.patch): + echo 'Patch #30 (bz784672-protect-against-calls-before-nss_init.patch):' + /bin/cat /builddir/build/SOURCES/bz784672-protect-against-calls-before-nss_init.patch + /usr/bin/patch -s -p0 -b --suffix .784672 --fuzz=0 Patch #32 (Bug-800674-Unable-to-contact-LDAP-Server-during-winsync.patch): + echo 'Patch #32 (Bug-800674-Unable-to-contact-LDAP-Server-during-winsync.patch):' + /bin/cat /builddir/build/SOURCES/Bug-800674-Unable-to-contact-LDAP-Server-during-winsync.patch + /usr/bin/patch -s -p0 -b --suffix .800674 --fuzz=0 Patch #33 (Bug-800682-Qpid-AMQP-daemon-fails-to-load-after-nss-update.patch): + echo 'Patch #33 (Bug-800682-Qpid-AMQP-daemon-fails-to-load-after-nss-update.patch):' + /bin/cat /builddir/build/SOURCES/Bug-800682-Qpid-AMQP-daemon-fails-to-load-after-nss-update.patch + /usr/bin/patch -s -p0 -b --suffix .800682 --fuzz=0 Patch #34 (Bug-800676-nss-workaround-for-freebl-bug-that-causes-openswan-to-drop-connections.patch): + echo 'Patch #34 (Bug-800676-nss-workaround-for-freebl-bug-that-causes-openswan-to-drop-connections.patch):' + /bin/cat /builddir/build/SOURCES/Bug-800676-nss-workaround-for-freebl-bug-that-causes-openswan-to-drop-connections.patch + /usr/bin/patch -s -p0 -b --suffix .800676 --fuzz=0 + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.SNxLRi + umask 022 + cd /builddir/build/BUILD + cd nss-3.13.3 + LANG=C + export LANG + unset DISPLAY + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib64 + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib64 + FREEBL_LIB_DIR=/usr/lib64 + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NO_SHA224_AVAILABLE=1 + NO_SHA224_AVAILABLE=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + USE_64=1 + export USE_64 + unset NSS_ENABLE_ECC + /usr/bin/make -C ./mozilla/security/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nsinstall.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pathsub.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pathsub.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pathsub.o -lpthread -ldl -lc true -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf' + /usr/bin/make -C ./mozilla/security/dbm make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' Creating ../../../dist/public/dbm ../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/db.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ../../../dbm/src/db.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/h_bigkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ../../../dbm/src/h_bigkey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/h_func.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ../../../dbm/src/h_func.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/h_log2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ../../../dbm/src/h_log2.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/h_page.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ../../../dbm/src/h_page.c ../../../dbm/src/h_page.c: In function 'new_lseek': ../../../dbm/src/h_page.c:165: warning: ignoring return value of 'write', declared with attribute warn_unused_result ../../../dbm/src/h_page.c: In function 'overflow_page': ../../../dbm/src/h_page.c:1002: warning: ignoring return value of 'write', declared with attribute warn_unused_result ../../../dbm/src/h_page.c:1017: warning: ignoring return value of 'write', declared with attribute warn_unused_result ../../../dbm/src/h_page.c:1043: warning: ignoring return value of 'write', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ../../../dbm/src/hash.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hash_buf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ../../../dbm/src/hash_buf.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mktemp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ../../../dbm/src/mktemp.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dirent.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dirent.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libdbm.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libdbm.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/db.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/h_bigkey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/h_func.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/h_log2.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/h_page.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hash.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hash_buf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mktemp.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dirent.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libdbm.a ../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libdbm.a ../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm' + /usr/bin/make -C ./mozilla/security/nss make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' Creating ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilrename.h ../../../../dist/public/nss Creating ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h hasht.h sechash.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd legacydb; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../../dist/public/nss cd legacydb; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pk11pars.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h pk11init.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmod.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secutil.h pk11table.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/quickder.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic quickder.c quickder.c: In function 'DecodeItem': quickder.c:637: warning: 'mark.type' may be used uninitialized in this function quickder.c:637: warning: 'mark.data' may be used uninitialized in this function quickder.c:637: warning: 'mark.len' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secdig.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secdig.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derdec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic derdec.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derenc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic derenc.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dersubr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dersubr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dertime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dertime.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/errstrs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic errstrs.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssb64d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nssb64d.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssb64e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nssb64e.c nssb64e.c: In function 'NSSBase64_EncodeItem_Util': nssb64e.c:669: warning: 'out_len' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssrwlk.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nssrwlk.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssilock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nssilock.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/oidstring.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic oidstring.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/portreg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic portreg.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secalgid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secalgid.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secasn1d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secasn1d.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secasn1e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secasn1e.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secasn1u.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secasn1u.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secitem.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secitem.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secload.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secload.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secoid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secoid.c secoid.c: In function 'secoid_HashNumber': secoid.c:1891: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sectime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sectime.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secport.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secport.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/templates.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic templates.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/utf8.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic utf8.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/quickder.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secdig.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derdec.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derenc.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dersubr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dertime.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/errstrs.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssb64d.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssb64e.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssrwlk.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssilock.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/oidstring.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/portreg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secalgid.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secasn1d.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secasn1e.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secasn1u.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secitem.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secload.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secoid.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sectime.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secport.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/templates.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/utf8.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil.a grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssutil.def rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssutil.def -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil3.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/quickder.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secdig.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derdec.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derenc.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dersubr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dertime.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/errstrs.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssb64d.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssb64e.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssrwlk.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssilock.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/oidstring.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/portreg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secalgid.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secasn1d.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secasn1e.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secasn1u.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secitem.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secload.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secoid.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sectime.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secport.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/templates.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/utf8.o -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil3.so ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/loader.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic loader.c loader.c: In function 'BL_Unload': loader.c:934: warning: unused variable 'status' rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libfreebl.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libfreebl.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/loader.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libfreebl.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libfreebl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib mkdir Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB /usr/bin/make FREEBL_CHILD_BUILD=1 \ OBJDIR=Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic freeblver.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ldvector.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sysrand.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sha_fast.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic md2.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic md5.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sha512.c sha512.c: In function 'SHA512_Compress': sha512.c:923: warning: unused variable 't1' sha512.c: In function 'SHA512_End': sha512.c:1218: warning: unused variable 't1' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic alghmac.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic rawhash.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic alg2268.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic arcfour.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic arcfive.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic -fno-strict-aliasing desblapi.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic des.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic drbg.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic rijndael.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic aeskeywrap.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic camellia.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dh.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ec.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pqg.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dsa.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic rsa.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic shvfy.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic tlsprfalg.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic seed.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic jpake.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mpi/mpprime.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mpi/mpmontg.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mpi/mplogic.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mpi/mpi.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mpi/mp_gf2m.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_amd64.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mpi/mpi_amd64.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_comba.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mpi/mp_comba.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mpi/mpcpucache.c mpi/mpcpucache.c: In function 's_mpi_getProcessorLineSize': mpi/mpcpucache.c:714: warning: dereferencing type-punned pointer will break strict-aliasing rules gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic stubs.c stubs.c: In function 'PR_Seek_stub': stubs.c:353: warning: enumeration value 'PR_SEEK_SET' not handled in switch gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour-amd64-gas.o -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic -march=opteron -m64 -fPIC -Wa,--noexecstack -c arcfour-amd64-gas.s gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_amd64_gas.o -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic -march=opteron -m64 -fPIC -Wa,--noexecstack -c mpi/mpi_amd64_gas.s gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/intel-aes.o -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic -march=opteron -m64 -fPIC -Wa,--noexecstack -c intel-aes.s grep -v ';-' freebl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_amd64.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_comba.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour-amd64-gas.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_amd64_gas.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/intel-aes.o -ldl -lc chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ecdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecdecode.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/fipsaudt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic fipsaudt.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/fipstest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic fipstest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/fipstokn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic fipstokn.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgglue.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lgglue.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lowkey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowpbe.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lowpbe.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/padbuf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic padbuf.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkcs11.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkcs11.c pkcs11.c: In function 'sftk_HashNumber': pkcs11.c:2124: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkcs11c.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkcs11c.c pkcs11c.c: In function 'NSC_DeriveKey': pkcs11c.c:6265: warning: passing argument 3 of 'sftk_forceAttribute' discards qualifiers from pointer target type pkcs11i.h:638: note: expected 'void *' but argument is of type 'const CK_BYTE *' pkcs11c.c: In function 'NSC_GenerateKey': pkcs11c.c:3257: warning: 'hashType' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkcs11u.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkcs11u.c pkcs11u.c: In function 'sftk_DeleteObject': pkcs11u.c:1210: warning: unused variable 'to' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsawrapr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic rsawrapr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sdb.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sftkdb.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkmod.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sftkmod.c sftkmod.c: In function 'sftkdb_DeleteSecmodDB': sftkmod.c:640: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result sftkmod.c: In function 'sftkdb_AddSecmodDB': sftkmod.c:749: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result sftkmod.c: In function 'sftkdb_DeleteSecmodDB': sftkmod.c:561: warning: 'name_len' may be used uninitialized in this function sftkmod.c:561: warning: 'lib_len' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkpars.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sftkpars.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkpwd.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sftkpwd.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/softkver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic softkver.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tlsprf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic tlsprf.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jpakesftk.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic jpakesftk.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ecdecode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/fipsaudt.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/fipstest.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/fipstokn.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgglue.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowkey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowpbe.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/padbuf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkcs11.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkcs11c.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkcs11u.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsawrapr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sdb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkdb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkmod.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkpars.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkpwd.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/softkver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tlsprf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jpakesftk.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn.a grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/softokn.def rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/softokn.def -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn3.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ecdecode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/fipsaudt.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/fipstest.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/fipstokn.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgglue.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowkey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowpbe.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/padbuf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkcs11.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkcs11c.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkcs11u.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsawrapr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sdb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkdb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkmod.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkpars.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sftkpwd.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/softkver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tlsprf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jpakesftk.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn3.so ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib cd legacydb; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dbmshim.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dbmshim.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/keydb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic keydb.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgattr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lgattr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgcreate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lgcreate.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgdestroy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lgdestroy.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lgfind.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lginit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lginit.c lginit.c: In function 'lg_HashNumber': lginit.c:518: warning: cast from pointer to integer of different size lginit.c: In function 'lg_CompareValues': lginit.c:524: warning: cast from pointer to integer of different size lginit.c:525: warning: cast from pointer to integer of different size lginit.c: In function 'legacy_Open': lginit.c:643: warning: 'certdbPtr' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lgutil.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lowcert.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lowkey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pcertdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pcertdb.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11db.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11db.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dbmshim.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/keydb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgattr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgcreate.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgdestroy.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgfind.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lginit.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowcert.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowkey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pcertdb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11db.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm.a grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssdbm.def rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssdbm.def -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm3.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dbmshim.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/keydb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgattr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgcreate.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgdestroy.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgfind.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lginit.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lgutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowcert.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lowkey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pcertdb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11db.o ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a -L../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -L../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm3.so ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm.a ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm3.so ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/arena.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic arena.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic error.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/errorval.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic errorval.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hashops.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic hashops.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic libc.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tracker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic tracker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/item.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic item.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/utf8.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic utf8.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic list.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic hash.c hash.c: In function 'nss_identity_hash': hash.c:90: warning: cast from pointer to integer of different size rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssb.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssb.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/arena.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/error.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/errorval.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hashops.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libc.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tracker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/item.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/utf8.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/list.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hash.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssb.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/devslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic devslot.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/devtoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic devtoken.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/devutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic devutil.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ckhelper.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ckhelper.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdev.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdev.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/devslot.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/devtoken.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/devutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ckhelper.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/asymmkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic asymmkey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certificate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certificate.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cryptocontext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cryptocontext.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/symmkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic symmkey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/trustdomain.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic trustdomain.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tdcache.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic tdcache.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certdecode.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkistore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkistore.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkibase.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkibase.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pki3hack.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pki3hack.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspki.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspki.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/asymmkey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certificate.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cryptocontext.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/symmkey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/trustdomain.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tdcache.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certdecode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkistore.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkibase.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pki3hack.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_certselector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_certselector.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_comcertselparams.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_certselector.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_crlselector.c pkix_crlselector.c: In function 'pkix_CRLSelector_Hashcode': pkix_crlselector.c:226: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_comcrlselparams.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_basicconstraintschecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_certchainchecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_crlchecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_ekuchecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_expirationchecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_namechainingchecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_nameconstraintschecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_ocspchecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_revocationmethod.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_revocationchecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_policychecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_signaturechecker.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_targetcertchecker.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixchecker.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_trustanchor.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_procparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_procparams.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_valparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_valparams.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_resourcelimits.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixparams.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixparams.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_procparams.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_valparams.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_buildresult.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_policynode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_policynode.c pkix_policynode.c: In function 'pkix_PolicyNode_Hashcode': pkix_policynode.c:860: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_valresult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_valresult.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_verifynode.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixresults.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixresults.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_policynode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_valresult.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_store.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_store.c pkix_store.c: In function 'pkix_CertStore_Hashcode': pkix_store.c:110: warning: cast from pointer to integer of different size pkix_store.c:111: warning: cast from pointer to integer of different size pkix_store.c:112: warning: cast from pointer to integer of different size pkix_store.c:113: warning: cast from pointer to integer of different size pkix_store.c:114: warning: cast from pointer to integer of different size rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixstore.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixstore.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_store.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_validate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_validate.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_lifecycle.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_build.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_build.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixtop.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixtop.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_validate.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_build.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_tools.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_tools.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_error.c pkix_error.c: In function 'pkix_Error_Hashcode': pkix_error.c:361: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_logger.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_logger.c pkix_logger.c: In function 'pkix_Logger_Hashcode': pkix_logger.c:528: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_list.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_errpaths.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixutil.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixutil.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_tools.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_error.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_logger.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_list.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_basicconstraints.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_cert.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_certpolicyinfo.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_certpolicymap.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_certpolicyqualifier.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_crl.c pkix_pl_crl.c: In function 'pkix_pl_CRL_ToString': pkix_pl_crl.c:387: warning: 'crlVersion' may be used uninitialized in this function pkix_pl_crl.c:387: note: 'crlVersion' was declared here gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_crldp.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_crlentry.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_date.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_generalname.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_infoaccess.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_nameconstraints.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_ocsprequest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_ocspresponse.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_publickey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_x500name.c pkix_pl_x500name.c:70: warning: 'pkix_pl_X500Name_ToString_Helper' defined but not used gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_ocspcertid.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixpki.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixpki.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_bigint.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_bytearray.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_common.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_error.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_hashtable.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_lifecycle.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_mem.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_monitorlock.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_mutex.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_object.c pkix_pl_object.c: In function 'pkix_pl_Object_Hashcode_Default': pkix_pl_object.c:407: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_oid.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_primhash.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_rwlock.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_string.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixsystem.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_aiamgr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_colcertstore.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_httpcertstore.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_httpdefaultclient.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_ldaptemplates.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_ldapcertstore.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_ldapresponse.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_ldaprequest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_ldapdefaultclient.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_nsscontext.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_pk11certstore.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pkix_pl_socket.c pkix_pl_socket.c: In function 'pkix_pl_socket_timestamp': pkix_pl_socket.c:98: warning: format '%lld' expects type 'long long int', but argument 2 has type 'PRInt64' pkix_pl_socket.c: In function 'pkix_pl_socket_traceLine': pkix_pl_socket.c:176: warning: cast from pointer to integer of different size pkix_pl_socket.c: In function 'pkix_pl_socket_tracePartialLine': pkix_pl_socket.c:220: warning: cast from pointer to integer of different size pkix_pl_socket.c: In function 'pkix_pl_socket_tracebuff': pkix_pl_socket.c:279: warning: cast from pointer to integer of different size rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixmodule.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/alg1485.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic alg1485.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certdb.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certv3.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certv3.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certxutl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certxutl.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crl.c crl.c: In function 'cert_CheckCertRevocationStatus': crl.c:2722: warning: unused variable 'rv2' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/genname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic genname.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/stanpcertdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic stanpcertdb.c stanpcertdb.c: In function 'CERT_FindCertByNicknameOrEmailAddr': stanpcertdb.c:711: warning: passing argument 2 of 'common_FindCertByNicknameOrEmailAddrForUsage' discards qualifiers from pointer target type stanpcertdb.c:633: note: expected 'char *' but argument is of type 'const char *' stanpcertdb.c: In function 'CERT_FindCertByNicknameOrEmailAddrForUsage': stanpcertdb.c:721: warning: passing argument 2 of 'common_FindCertByNicknameOrEmailAddrForUsage' discards qualifiers from pointer target type stanpcertdb.c:633: note: expected 'char *' but argument is of type 'const char *' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/polcyxtn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic polcyxtn.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secname.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xauthkid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic xauthkid.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xbsconst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic xbsconst.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xconst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic xconst.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcertdb.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcertdb.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/alg1485.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certdb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certv3.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certxutl.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crl.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/genname.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/stanpcertdb.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/polcyxtn.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secname.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xauthkid.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xbsconst.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xconst.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certhtml.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certhtml.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certreq.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certreq.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlv2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crlv2.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ocsp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ocsp.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certhigh.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certhigh.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certvfy.c certvfy.c: In function 'cert_VerifyCertChainOld': certvfy.c:533: warning: cast to pointer from integer of different size certvfy.c:597: warning: cast to pointer from integer of different size certvfy.c:625: warning: cast to pointer from integer of different size certvfy.c:653: warning: cast to pointer from integer of different size certvfy.c: In function 'CERT_VerifyCACertForUsage': certvfy.c:868: warning: cast to pointer from integer of different size certvfy.c:893: warning: cast to pointer from integer of different size certvfy.c: In function 'CERT_VerifyCertificate': certvfy.c:1189: warning: cast to pointer from integer of different size certvfy.c:1196: warning: cast to pointer from integer of different size certvfy.c:1205: warning: cast to pointer from integer of different size certvfy.c: In function 'CERT_VerifyCert': certvfy.c:1327: warning: cast to pointer from integer of different size certvfy.c:1331: warning: cast to pointer from integer of different size certvfy.c:1337: warning: cast to pointer from integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certvfypkix.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certvfypkix.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certvfypkixprint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certvfypkixprint.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xcrldist.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic xcrldist.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcerthi.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcerthi.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certhtml.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certreq.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlv2.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ocsp.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certhigh.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certvfy.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certvfypkix.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certvfypkixprint.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xcrldist.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dev3hack.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dev3hack.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11akey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11akey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11auth.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11auth.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11cert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11cert.c pk11cert.c: In function 'PK11_IsUserCert': pk11cert.c:177: warning: enumeration value 'rsaPssKey' not handled in switch pk11cert.c:177: warning: enumeration value 'rsaOaepKey' not handled in switch pk11cert.c: In function 'PK11_FindCertFromDERCertItem': pk11cert.c:2170: warning: unused variable 'td' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11cxt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11cxt.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11err.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11err.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11kea.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11kea.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11list.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11load.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11load.c pk11load.c: In function 'SECMOD_UnloadModule': pk11load.c:600: warning: unused variable 'status' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11mech.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11mech.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11merge.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11merge.c pk11merge.c: In function 'pk11_mergeByObjectIDs': pk11merge.c:1259: warning: 'error' may be used uninitialized in this function pk11merge.c: In function 'PK11_MergeTokens': pk11merge.c:1323: warning: 'error' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11nobj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11nobj.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11obj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11obj.c pk11obj.c: In function 'PK11_WriteRawAttribute': pk11obj.c:1389: warning: 'handle' may be used uninitialized in this function pk11obj.c: In function 'PK11_ReadRawAttribute': pk11obj.c:1442: warning: 'handle' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pars.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11pars.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pbe.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11pbe.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pk12.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11pk12.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11pqg.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11sdr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11sdr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11skey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11skey.c pk11skey.c: In function 'pk11_TokenKeyGenWithFlagsAndKeyType': pk11skey.c:923: warning: unused variable 'isToken' pk11skey.c:919: warning: unused variable 'crv' pk11skey.c:917: warning: unused variable 'session' pk11skey.c: In function 'PK11_PubDerive': pk11skey.c:1601: warning: enumeration value 'rsaPssKey' not handled in switch pk11skey.c:1601: warning: enumeration value 'rsaOaepKey' not handled in switch gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11slot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11slot.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11util.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpk11wrap.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dev3hack.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11akey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11auth.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11cert.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11cxt.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11err.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11kea.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11list.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11load.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11mech.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11merge.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11nobj.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11obj.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pars.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pbe.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pk12.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pqg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11sdr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11skey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11slot.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11util.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sechash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sechash.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/seckey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic seckey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secsign.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secvfy.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dsautil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dsautil.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcryptohi.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcryptohi.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sechash.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/seckey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secsign.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secvfy.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dsautil.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nssinit.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nssver.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/utilwrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic utilwrap.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssinit.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/utilwrap.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nss.def rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nss.def -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss3.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssinit.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/utilwrap.o ../certhigh/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certhtml.o ../certhigh/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certreq.o ../certhigh/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlv2.o ../certhigh/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ocsp.o ../certhigh/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certhigh.o ../certhigh/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certvfy.o ../certhigh/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certvfypkix.o ../certhigh/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certvfypkixprint.o ../certhigh/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xcrldist.o ../cryptohi/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sechash.o ../cryptohi/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/seckey.o ../cryptohi/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secsign.o ../cryptohi/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secvfy.o ../cryptohi/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dsautil.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dev3hack.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11akey.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11auth.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11cert.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11err.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11kea.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11list.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11load.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11mech.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11merge.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11obj.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pars.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11skey.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11slot.o ../pk11wrap/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11util.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/alg1485.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certdb.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certv3.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certxutl.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crl.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/genname.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/stanpcertdb.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/polcyxtn.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secname.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xauthkid.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xbsconst.o ../certdb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/xconst.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/asymmkey.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certificate.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cryptocontext.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/symmkey.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/trustdomain.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tdcache.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certdecode.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkistore.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkibase.o ../pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pki3hack.o ../dev/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/devslot.o ../dev/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/devtoken.o ../dev/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/devutil.o ../dev/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ckhelper.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/arena.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/error.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/errorval.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hashops.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libc.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tracker.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/item.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/utf8.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/list.o ../base/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss3.so ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derive.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic derive.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/prelib.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic prelib.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3con.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ssl3con.c ssl3con.c: In function 'ssl3_FinishHandshake': ssl3con.c:8615: warning: unused variable 'rv' ssl3con.c: At top level: ssl3con.c:758: warning: 'anyRestrictedEnabled' defined but not used gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3gthr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ssl3gthr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslauth.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslauth.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslcon.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslcon.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssldef.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ssldef.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslenum.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslenum.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslerr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslerr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslerrstrs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslerrstrs.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslinit.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3ext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ssl3ext.c ssl3ext.c: In function 'ssl3_ServerHandleSessionTicketXtn': ssl3ext.c:1039: warning: 'aes_key_pkcs11' may be used uninitialized in this function ssl3ext.c:1040: warning: 'mac_key_pkcs11' may be used uninitialized in this function ssl3ext.c: In function 'ssl3_SendNewSessionTicket': ssl3ext.c:685: warning: 'aes_key_pkcs11' may be used uninitialized in this function ssl3ext.c:686: warning: 'mac_key_pkcs11' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslgathr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslgathr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslmutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslmutex.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslnonce.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslnonce.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslreveal.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslreveal.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslsecur.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslsecur.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslsnce.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslsnce.c sslsnce.c: In function 'InitCache': sslsnce.c:1257: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1258: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1259: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1260: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1261: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1262: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1263: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1264: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1265: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1266: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1267: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1268: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1269: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c: In function 'SSL_InheritMPServerSIDCacheInstance': sslsnce.c:1609: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1610: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1611: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1612: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1613: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1614: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1615: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1616: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1617: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1618: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1619: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1620: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1621: warning: dereferencing type-punned pointer will break strict-aliasing rules gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslsock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslsock.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssltrace.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ssltrace.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslver.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/authcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic authcert.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmpcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmpcert.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsskea.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nsskea.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sslinfo.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3ecc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ssl3ecc.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/unix_err.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic unix_err.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derive.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/prelib.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslauth.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslcon.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssldef.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslenum.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslerr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslinit.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslgathr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslsock.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/authcert.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsskea.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/unix_err.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl.def rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl.def -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl3.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derive.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/prelib.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslauth.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslcon.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssldef.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslenum.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslerr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslinit.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslgathr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslsock.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/authcert.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsskea.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/unix_err.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl3.so ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12local.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p12local.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12creat.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p12creat.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12dec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p12dec.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12plcy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p12plcy.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12tmpl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p12tmpl.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p12e.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p12d.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs12.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs12.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12local.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12creat.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12dec.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12plcy.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12tmpl.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12e.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12d.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certread.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certread.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7common.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p7common.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7create.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p7create.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7decode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p7decode.c p7decode.c: In function 'sec_pkcs7_decoder_get_recipient_key': p7decode.c:443: warning: unused variable 'bulkLength' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7encode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p7encode.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7local.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p7local.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secmime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secmime.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs7.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs7.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certread.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7common.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7create.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7decode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7encode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7local.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secmime.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsarray.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsarray.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsasn1.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsasn1.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsattr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsattr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmscinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmscinfo.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmscipher.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmscipher.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsdecode.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsdigdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsdigdata.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsdigest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsdigest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsencdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsencdata.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsencode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsencode.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsenvdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsenvdata.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsmessage.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsmessage.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmspubkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmspubkey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsrecinfo.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsreclist.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsreclist.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmssigdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmssigdata.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmssiginfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmssiginfo.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsudf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsudf.c cmsudf.c: In function 'nss_cmstype_hash_key': cmsudf.c:116: warning: cast from pointer to integer of different size cmsudf.c: In function 'nss_cmstype_compare_keys': cmsudf.c:122: warning: cast from pointer to integer of different size cmsudf.c:123: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsutil.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smimemessage.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic smimemessage.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smimeutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic smimeutil.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smimever.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic smimever.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smimever.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smime.def rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smime.def -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime3.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/smimever.o ../pkcs12/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12local.o ../pkcs12/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12creat.o ../pkcs12/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12dec.o ../pkcs12/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12plcy.o ../pkcs12/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12tmpl.o ../pkcs12/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12e.o ../pkcs12/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p12d.o ../pkcs7/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certread.o ../pkcs7/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7common.o ../pkcs7/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7create.o ../pkcs7/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7decode.o ../pkcs7/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7encode.o ../pkcs7/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7local.o ../pkcs7/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secmime.o -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfenc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crmfenc.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmftmpl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crmftmpl.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfreq.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crmfreq.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfpop.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crmfpop.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfdec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crmfdec.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfget.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crmfget.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfcont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crmfcont.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmmfasn1.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmmfasn1.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmmfresp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmmfresp.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmmfrec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmmfrec.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmmfchal.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmmfchal.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/servget.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic servget.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/encutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic encutil.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/respcli.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic respcli.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/respcmn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic respcmn.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/challcli.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic challcli.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/asn1cmn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic asn1cmn.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcrmf.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcrmf.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfenc.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmftmpl.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfreq.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfpop.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfdec.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfget.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmfcont.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmmfasn1.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmmfresp.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmmfrec.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmmfchal.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/servget.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/encutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/respcli.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/respcmn.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/challcli.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/asn1cmn.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jarver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic jarver.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jarsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic jarsign.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jar.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic jar.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jar-ds.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic jar-ds.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jarfile.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic jarfile.c jarfile.c: In function 'jar_listzip': jarfile.c:722: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:726: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:727: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:749: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:754: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:755: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:793: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:816: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:817: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:818: warning: dereferencing type-punned pointer will break strict-aliasing rules gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jarint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic jarint.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libjar.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libjar.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jarver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jarsign.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jar.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jar-ds.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jarfile.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/jarint.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libjar.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libjar.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crypto.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crypto.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/find.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic find.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic hash.c hash.c: In function 'nss_ckfw_identity_hash': hash.c:87: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/instance.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic instance.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mutex.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/object.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic object.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/session.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic session.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sessobj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sessobj.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/slot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic slot.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/token.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic token.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/wrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic wrap.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mechanism.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mechanism.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckfw.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckfw.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crypto.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/find.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/hash.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/instance.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mutex.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/object.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/session.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sessobj.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/slot.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/token.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/wrap.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mechanism.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/anchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic anchor.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/constants.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic constants.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic bfind.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/binst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic binst.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bobject.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic bobject.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bsession.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic bsession.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic bslot.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/btoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic btoken.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certdata.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ckbiver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssckbi.def rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckbi.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nssckbi.def -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckbi.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/anchor.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/constants.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bfind.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/binst.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bobject.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bsession.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bslot.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/btoken.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certdata.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ckbiver.o ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/anchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic anchor.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/constants.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic constants.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pargs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pargs.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pfind.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pinst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pinst.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pobject.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pobject.c pobject.c: In function 'pem_DestroyInternalObject': pobject.c:588: warning: enumeration value 'pemAll' not handled in switch gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/prsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic prsa.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/psession.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic psession.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pslot.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ptoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ptoken.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ckpemver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ckpemver.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsawrapr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic rsawrapr.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic util.c grep -v ';-' nsspem.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsspem.def rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspem.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnsspem.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsspem.def -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspem.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/anchor.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/constants.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pargs.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pfind.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pinst.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pobject.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/prsa.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/psession.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pslot.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ptoken.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ckpemver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsawrapr.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/util.o ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /usr/lib64/libfreebl.a -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -L../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -lfreebl3 -L../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssckfw -lnssb -lplc4 -lplds4 -L../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -lfreebl3 -lsoftokn3 -lpthread -ldl -lc -lfreebl3 chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspem.so ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspem.so ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsssysinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nsssysinit.c ../../../../dist/private/nss/pk11pars.h:246: warning: 'secmod_argParseModuleSpec' defined but not used ../../../../dist/private/nss/pk11pars.h:327: warning: 'secmod_argSetNewCipherFlags' defined but not used ../../../../dist/private/nss/pk11pars.h:499: warning: 'secmod_argParseSlotInfo' defined but not used ../../../../dist/private/nss/pk11pars.h:756: warning: 'secmod_mkSlotString' defined but not used ../../../../dist/private/nss/pk11pars.h:793: warning: 'secmod_mkNSS' defined but not used ../../../../dist/private/nss/pk11pars.h:854: warning: 'secmod_mkNewModuleSpec' defined but not used rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsssysinit.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.a rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnsssysinit.so -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsssysinit.o -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secutil.c secutil.c: In function 'SECU_displayVerifyLog': secutil.c:3687: warning: cast from pointer to integer of different size secutil.c:3703: warning: cast from pointer to integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secpwd.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic secpwd.c secpwd.c: In function 'SEC_GetPassword': secpwd.c:109: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derprint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic derprint.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/moreoids.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic moreoids.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pppolicy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pppolicy.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ffs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ffs.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11table.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11table.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsectool.a ar cr Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsectool.a Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/secpwd.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derprint.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/moreoids.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pppolicy.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ffs.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11table.o ranlib Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsectool.a ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsectool.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/addbuiltin.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic addbuiltin.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/addbuiltin -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/addbuiltin.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/addbuiltin ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/atob.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic atob.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/atob -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/atob.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/atob ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/blapitest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic blapitest.c blapitest.c: In function 'setupIO': blapitest.c:904: warning: pointer targets in assignment differ in signedness blapitest.c: In function 'finishIO': blapitest.c:982: warning: pointer targets in passing argument 2 of 'char2_from_hex' differ in signedness blapitest.c:332: note: expected 'unsigned char *' but argument is of type 'char *' blapitest.c:992: warning: pointer targets in passing argument 2 of 'char2_from_hex' differ in signedness blapitest.c:332: note: expected 'unsigned char *' but argument is of type 'char *' blapitest.c: In function 'bltest_camellia_init': blapitest.c:1376: warning: unused variable 'blocklen' blapitest.c: In function 'cipherDoOp': blapitest.c:2396: warning: pointer targets in passing argument 3 of 'cipherInfo->cipher.symmkeyCipher' differ in signedness blapitest.c:2396: note: expected 'unsigned int *' but argument is of type 'int *' blapitest.c:2407: warning: pointer targets in passing argument 3 of 'cipherInfo->cipher.symmkeyCipher' differ in signedness blapitest.c:2407: note: expected 'unsigned int *' but argument is of type 'int *' blapitest.c:2422: warning: pointer targets in passing argument 3 of 'cipherInfo->cipher.symmkeyCipher' differ in signedness blapitest.c:2422: note: expected 'unsigned int *' but argument is of type 'int *' blapitest.c: In function 'main': blapitest.c:3598: warning: 'ret' may be used uninitialized in this function blapitest.c:3491: warning: 'cipherInfo' may be used uninitialized in this function blapitest.c:3488: warning: 'totalTime' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bltest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/blapitest.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bltest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/btoa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic btoa.c btoa.c: In function 'encode_file': btoa.c:110: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/btoa -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/btoa.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/btoa ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certcgi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certcgi.c certcgi.c: In function 'get_serial_number': certcgi.c:622: warning: ignoring return value of 'fread', declared with attribute warn_unused_result certcgi.c:635: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result certcgi.c:646: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result certcgi.c: In function 'main': certcgi.c:2389: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result certcgi.c: At top level: certcgi.c:392: warning: 'update_data_by_name' defined but not used certcgi.c:420: warning: 'update_data_by_index' defined but not used certcgi.c:436: warning: 'add_field' defined but not used gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certcgi -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certcgi.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certcgi ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certext.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certutil.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/keystuff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic keystuff.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certext.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/keystuff.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/checkcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic checkcert.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/checkcert -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/checkcert.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/checkcert ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/chktest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic chktest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/chktest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/chktest.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/chktest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlgen_lex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crlgen_lex.c crlgen_lex_orig.l: In function 'yylex': crlgen_lex_orig.l:144: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlgen.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crlgen.c crlgen.c: In function 'crlgen_CreateInvalidityDate': crlgen.c:630: warning: 'mark' may be used uninitialized in this function crlgen.c: In function 'crlgen_CreateReasonCode': crlgen.c:580: warning: 'mark' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic crlutil.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlgen_lex.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlgen.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlutil.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/testcrmf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic testcrmf.c testcrmf.c:973: warning: 'mapWrapKeyType' defined but not used gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmftest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/testcrmf.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmftest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dbtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dbtest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dbtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dbtest.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dbtest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derdump.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic derdump.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derdump -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derdump.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../modutil/error.h:168: warning: 'msgStrings' defined but not used ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derdump ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/digest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic digest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/digest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/digest.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/digest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/makepqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic makepqg.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/makepqg -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/makepqg.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/makepqg ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/multinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic multinit.c multinit.c:352: warning: 'appendItem' defined but not used gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/multinit -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/multinit.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/multinit ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ocspclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ocspclnt.c ocspclnt.c: In function 'main': ocspclnt.c:996: warning: 'cert_usage' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ocspclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ocspclnt.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ocspclnt ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/oidcalc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic oidcalc.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/oidcalc -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/oidcalc.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/oidcalc ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7content.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p7content.c p7content.c: In function 'PrintBytes': p7content.c:91: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7content -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7content.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7content ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7env.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p7env.c p7env.c: In function 'EncryptOut': p7env.c:94: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7env -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7env.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7env ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7sign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p7sign.c p7sign.c: In function 'SignOut': p7sign.c:96: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result p7sign.c: In function 'main': p7sign.c:184: warning: 'cert' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7sign -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7sign.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7sign ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7verify.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic p7verify.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7verify -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7verify.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7verify ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk12util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk12util.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk12util -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk12util.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk12util ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11mode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11mode.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11mode -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11mode.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11mode ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pp.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pp -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pp.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pp ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsaperf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic rsaperf.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/defkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic defkey.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsaperf -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsaperf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/defkey.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsaperf ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sdrtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sdrtest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sdrtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sdrtest.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sdrtest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/selfserv.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic selfserv.c selfserv.c: In function 'printSecurityInfo': selfserv.c:407: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result selfserv.c: In function 'handle_connection': selfserv.c:1329: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/selfserv -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/selfserv.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/selfserv ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signtool.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic signtool.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certgen.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic certgen.c certgen.c: In function 'GetSubjectFromUser': certgen.c:157: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:179: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:198: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:216: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:234: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:255: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:273: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c: In function 'output_ca_cert': certgen.c:706: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/javascript.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic javascript.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic list.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic sign.c sign.c: In function 'SignOut': sign.c:866: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic util.c util.c: In function 'XP_GetString': util.c:53: warning: return discards qualifiers from pointer target type gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/verify.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic verify.c verify.c: In function 'VerifyJar': verify.c:87: warning: assignment discards qualifiers from pointer target type verify.c: In function 'JarWho': verify.c:318: warning: assignment discards qualifiers from pointer target type gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/zip.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic zip.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signtool -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signtool.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certgen.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/javascript.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/list.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sign.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/util.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/verify.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/zip.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signtool ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic signver.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk7print.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk7print.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signver -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk7print.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signver ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/shlibsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic shlibsign.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/shlibsign -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/shlibsign.o -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/shlibsign ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mangle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic mangle.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mangle -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mangle.o -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mangle ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' cd Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ" Linux \ "/usr/lib64" "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so" /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so Library File: ../../../security/nss/lib/softoken/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn3.so 998779 bytes Check File: ../../../security/nss/lib/softoken/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn3.chk Link: libsoftokn3.chk hash: 20 bytes ff f9 b1 c4 05 ae bd 0e 1a 3c 50 5a d8 eb 8f 37 d3 e7 66 a5 signature: 40 bytes 37 97 41 95 35 90 5a cf 73 24 67 60 fe be 5a fd 2f ac 57 77 53 fa 84 98 2c 2a e0 c4 8b c8 91 f6 db bf d5 7b 40 17 bc 08 moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... cd Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ" Linux \ "/usr/lib64" "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so" /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so Library File: ../../../security/nss/lib/freebl/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 991054 bytes Check File: ../../../security/nss/lib/freebl/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk Link: libfreebl3.chk hash: 20 bytes c4 9a 77 ff b1 0d c0 f8 d1 e4 5b 8a 85 c3 1c 28 36 d6 0d f4 signature: 40 bytes 65 b6 fc c3 35 b7 bd 2f 1d 9a 4c 89 93 89 b7 a9moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... 00 3e 8e 9e 8f 05 84 21 c5 2b f3 af 93 c9 fe 26 1b 31 9c e7 c0 e5 36 57 cd Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ" Linux \ "/usr/lib64" "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so" /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so Library File: ../../../security/nss/lib/softoken/legacydb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm3.so 760396 bytes Check File: ../../../security/nss/lib/softoken/legacydb/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm3.chk Link: libnssdbm3.chk hash: 20 bytes d1 e1 51 ad 5a d1 18 ba 81 bb d6 06 e3 d0 a6 91 e6 95 2e 1c signature: 40 bytes 66 e1 60 98 0d 0f ac a4 00 6c 75 4c 76 9f 09 12moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... 84 4c 2f d5 ba cc c1 1d 2a 5e 03 57 13 ea 36 4f 5f 8a 9b 9e 4f 6e 99 8a make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic cmsutil.c cmsutil.c: In function 'decode': cmsutil.c:409: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result cmsutil.c: In function 'encrypted_data': cmsutil.c:888: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result cmsutil.c: In function 'main': cmsutil.c:1631: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsutil.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssltap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ssltap.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssltap -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssltap.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssltap ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/strsclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic strsclnt.c strsclnt.c: In function 'myHandshakeCallback': strsclnt.c:737: warning: cast from pointer to integer of different size strsclnt.c: In function 'do_connects': strsclnt.c:862: warning: cast to pointer from integer of different size gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/strsclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/strsclnt.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/strsclnt ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/symkeyutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic symkeyutil.c symkeyutil.c: In function 'main': symkeyutil.c:1050: warning: unused variable 'rv2' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/symkeyutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/symkeyutil.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/symkeyutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/baddbdir.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic baddbdir.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/baddbdir -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/baddbdir.o \ ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/conflict.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic conflict.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/conflict -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/conflict.o \ ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dertimetest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic dertimetest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dertimetest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dertimetest.o \ ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/encodeinttest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic encodeinttest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/encodeinttest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/encodeinttest.o \ ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nonspr10.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic nonspr10.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nonspr10 -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nonspr10.o \ ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/remtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic remtest.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/remtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/remtest.o \ ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/baddbdir Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/conflict Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dertimetest Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/encodeinttest Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nonspr10 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/remtest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tstclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic tstclnt.c tstclnt.c: In function 'main': tstclnt.c:846: warning: 'ctmp' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tstclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tstclnt.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tstclnt ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfychain.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic vfychain.c vfychain.c: In function 'configureRevocationParams': vfychain.c:365: warning: 'revFlags' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfychain -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfychain.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfychain ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfyserv.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic vfyserv.c vfyserv.c: In function 'main': vfyserv.c:546: warning: 'ctmp' may be used uninitialized in this function gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfyutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic vfyutil.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfyserv -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfyserv.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfyutil.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfyserv ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/modutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic modutil.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic pk11.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/instsec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic instsec.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/install.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic install.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/installparse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic installparse.c ytab.c: In function 'Pk11Install_yyparse': ytab.c:219: warning: suggest parentheses around assignment used as truth value gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/install-ds.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic install-ds.c install-ds.c: In function 'Pk11Install_File_Generate': install-ds.c:255: warning: comparison with string literal results in unspecified behavior gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic lex.Pk11Install_yy.c lex.Pk11Install_yy.cpp: In function 'Pk11Install_yylex': installparse.l:81: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result installparse.l: At top level: lex.Pk11Install_yy.cpp:1060: warning: 'Pkcs11Install_yyunput' defined but not used lex.Pk11Install_yy.cpp:1106: warning: 'input' defined but not used gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/modutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/modutil.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/instsec.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/install.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/installparse.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/install-ds.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib64:$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/modutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss' + NSS_ENABLE_ECC=1 + export NSS_ENABLE_ECC + NSS_ECC_MORE_THAN_SUITE_B=1 + export NSS_ECC_MORE_THAN_SUITE_B + /usr/bin/make -C ./mozilla/security/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' true -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf' + /usr/bin/make -C ./mozilla/security/dbm make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' ../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' ../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libdbm.a ../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm' + /usr/bin/make -C ./mozilla/security/nss make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilrename.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h hasht.h sechash.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd legacydb; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../../dist/public/nss cd legacydb; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pk11pars.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h pk11init.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmod.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secutil.h pk11table.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssutil3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libfreebl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib /usr/bin/make FREEBL_CHILD_BUILD=1 \ OBJDIR=Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecl.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecl_curve.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecl_mult.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecl_gf.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecp_aff.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecp_jac.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecp_mont.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ec_naf.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecp_jm.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ec2_aff.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ec2_mont.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ec2_proj.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ec2_163.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ec2_193.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ec2_233.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecp_192.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecp_224.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecp_256.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecp_384.c gcc -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic ecl/ecp_521.c rm -f Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_amd64.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_comba.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour-amd64-gas.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_amd64_gas.o Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/intel-aes.o -ldl -lc chmod +x Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsoftokn3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib cd legacydb; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm.a ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdbm3.so ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnss3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libssl3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libjar.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsspem.so ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/libsectool.a ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/addbuiltin ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/atob ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bltest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/btoa ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certcgi ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/certutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/checkcert ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/chktest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crlutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/crmftest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dbtest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/derdump ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/digest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/makepqg ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/multinit ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ocspclnt ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/oidcalc ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7content ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7env ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7sign ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/p7verify ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk12util ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pk11mode ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/pp ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/rsaperf ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/sdrtest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/selfserv ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signtool ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/signver ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/shlibsign ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' ../../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/mangle ../../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' cd Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ" Linux \ "/usr/lib64" "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so" /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so Library File: ../../../security/nss/lib/freebl/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 991757 bytes Check File: ../../../security/nss/lib/freebl/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk Link: libfreebl3.chk hash: 20 bytes 16 97 92 b0 29 e5 2e 98 b7 f4 b7 c1 45 bc ce 4d 77 92 67 6b signature: 40 bytes 64 9b e8 49 60 e0 cf 93 01 3d 9b 2a c4 99 42 c2 camoduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... 53 c3 6f 12 08 70 17 2f 6d a6 18 17 4d 14 c7 7f 47 84 5c b2 5c a6 dd make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/cmsutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/ssltap ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/strsclnt ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/symkeyutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/baddbdir Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/conflict Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/dertimetest Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/encodeinttest Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nonspr10 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/remtest ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/tstclnt ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfychain ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/vfyserv ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' ../../../coreconf/nsinstall/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/modutil ../../../../dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss' + /bin/mkdir -p ./mozilla/dist/pkgconfig + /bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib64,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.13.3,g -e s,%NSPR_VERSION%,4.9,g -e s,%NSSUTIL_VERSION%,3.13.3,g -e s,%SOFTOKEN_VERSION%,3.12.9,g ++ cat mozilla/security/nss/lib/nss/nss.h ++ awk '{print $3}' ++ grep '#define.*NSS_VMAJOR' + NSS_VMAJOR=3 ++ cat mozilla/security/nss/lib/nss/nss.h ++ awk '{print $3}' ++ grep '#define.*NSS_VMINOR' + NSS_VMINOR=13 ++ cat mozilla/security/nss/lib/nss/nss.h ++ awk '{print $3}' ++ grep '#define.*NSS_VPATCH' + NSS_VPATCH=3 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib64,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,13,g -e s,@MOD_PATCH_VERSION@,3,g + chmod 755 ./mozilla/dist/pkgconfig/nss-config + /bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./mozilla/dist/pkgconfig/setup-nsssysinit.sh + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.tXTH2N + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64 '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64 ++ dirname /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64 + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64 + cd nss-3.13.3 + LANG=C + export LANG + unset DISPLAY + /bin/rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64 + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/pkgconfig + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64 + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/nss/unsupported-tools + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/base64.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/blapit.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ciferfam.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ecl-exp.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/hasht.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssb64.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssb64t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssilckt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssilock.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nsslocks.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nsspem.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssrwlk.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssrwlkt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssutil.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11f.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11n.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11p.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11u.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/portreg.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secasn1.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secasn1t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/seccomon.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secder.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdert.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdig.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdigt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secerr.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secitem.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secoid.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secoidt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secport.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/shsign.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/utilrename.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3 + /usr/bin/install -p -m 644 ./mozilla/dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/lib64/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./mozilla/dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin/nss-config + /usr/bin/install -p -m 755 ./mozilla/dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/bin/setup-nsssysinit.sh + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/base64.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/ciferfam.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/nssb64.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/nssb64t.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/nsslocks.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/nssilock.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/nssilckt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/nssrwlk.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/nssrwlkt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/nssutil.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/pkcs11.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/pkcs11f.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/pkcs11n.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/pkcs11p.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/pkcs11t.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/pkcs11u.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/portreg.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secasn1.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secasn1t.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/seccomon.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secder.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secdert.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secdig.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secdigt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secerr.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secitem.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secoid.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secoidt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secport.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/utilrename.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/alghmac.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/blapit.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/ecl-exp.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/hasht.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/sechash.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/secmodt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/shsign.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64//usr/include/nss3/nsslowhash.h + /usr/lib/rpm/find-debuginfo.sh --strict-build-id /builddir/build/BUILD/nss-3.13.3 extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/libnsspem.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/lib64/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64/usr/bin/signtool cpio: nss-3.13.3/mozilla/security/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.13.3/mozilla/security/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 23286 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/redhat/brp-strip-comment-note /usr/bin/strip /usr/bin/objdump + /usr/lib/rpm/brp-python-bytecompile + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.PxY8dC + umask 022 + cd /builddir/build/BUILD + cd nss-3.13.3 + unset DISPLAY + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT + USE_64=1 + export USE_64 ++ find ./mozilla/security/nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' + MYRAND=9793 9793 + echo 9793 + RANDSERV=selfserv_9793 + echo selfserv_9793 selfserv_9793 ++ ls -d ./mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin + DISTBINDIR=./mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin ./mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin + echo ./mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin ++ pwd + pushd /builddir/build/BUILD/nss-3.13.3 ~/build/BUILD/nss-3.13.3 ~/build/BUILD/nss-3.13.3 + cd ./mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin + ln -s selfserv selfserv_9793 + popd ~/build/BUILD/nss-3.13.3 + find ./mozilla/security/nss/tests -type f + xargs grep -lw selfserv + grep -v '\.crt$' + grep -v '\.db$' + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9793/g' + grep -v '\.crl$' + grep -vw CVS + killall selfserv_9793 selfserv_9793: no process killed + : + rm -rf ./mozilla/tests_results + cd ./mozilla/security/nss/tests/ + HOST=localhost + DOMSUF=localdomain + PORT=9793 + NSS_CYCLES= + NSS_TESTS= + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh testdir is /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security which: no domainname in (.:/builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/root/bin:/usr/local/sbin:/builddir/bin) ******************************************** Platform: Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/root/bin:/usr/local/sbin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib: Running tests for cipher TIMESTAMP cipher BEGIN: Mon Mar 26 17:40:51 EDT 2012 cipher.sh: Cipher Tests =============================== cipher.sh: DES ECB Encrypt -------------------------------- bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des_ecb passed. cipher.sh: #1: DES ECB Encrypt - PASSED cipher.sh: DES ECB Decrypt -------------------------------- bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des_ecb passed. cipher.sh: #2: DES ECB Decrypt - PASSED cipher.sh: DES CBC Encrypt -------------------------------- bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des_cbc passed. cipher.sh: #3: DES CBC Encrypt - PASSED cipher.sh: DES CBC Decrypt -------------------------------- bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des_cbc passed. cipher.sh: #4: DES CBC Decrypt - PASSED cipher.sh: DES3 ECB Encrypt -------------------------------- bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des3_ecb passed. cipher.sh: #5: DES3 ECB Encrypt - PASSED cipher.sh: DES3 ECB Decrypt -------------------------------- bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des3_ecb passed. cipher.sh: #6: DES3 ECB Decrypt - PASSED cipher.sh: DES3 CBC Encrypt -------------------------------- bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des3_cbc passed. cipher.sh: #7: DES3 CBC Encrypt - PASSED cipher.sh: DES3 CBC Decrypt -------------------------------- bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des3_cbc passed. cipher.sh: #8: DES3 CBC Decrypt - PASSED cipher.sh: AES ECB Encrypt -------------------------------- bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_ecb passed. cipher.sh: #9: AES ECB Encrypt - PASSED cipher.sh: AES ECB Decrypt -------------------------------- bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for aes_ecb passed. cipher.sh: #10: AES ECB Decrypt - PASSED cipher.sh: AES CBC Encrypt -------------------------------- bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_cbc passed. cipher.sh: #11: AES CBC Encrypt - PASSED cipher.sh: AES CBC Decrypt -------------------------------- bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for aes_cbc passed. cipher.sh: #12: AES CBC Decrypt - PASSED cipher.sh: Camellia ECB Encrypt -------------------------------- bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. cipher.sh: #13: Camellia ECB Encrypt - PASSED cipher.sh: Camellia ECB Decrypt -------------------------------- bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. cipher.sh: #14: Camellia ECB Decrypt - PASSED cipher.sh: Camellia CBC Encrypt -------------------------------- bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. cipher.sh: #15: Camellia CBC Encrypt - PASSED cipher.sh: Camellia CBC Decrypt -------------------------------- bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. cipher.sh: #16: Camellia CBC Decrypt - PASSED cipher.sh: SEED ECB Encrypt -------------------------------- bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for seed_ecb passed. cipher.sh: #17: SEED ECB Encrypt - PASSED cipher.sh: SEED ECB Decrypt -------------------------------- bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for seed_ecb passed. cipher.sh: #18: SEED ECB Decrypt - PASSED cipher.sh: SEED CBC Encrypt -------------------------------- bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for seed_cbc passed. cipher.sh: #19: SEED CBC Encrypt - PASSED cipher.sh: SEED CBC Decrypt -------------------------------- bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for seed_cbc passed. cipher.sh: #20: SEED CBC Decrypt - PASSED cipher.sh: RC2 ECB Encrypt -------------------------------- bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc2_ecb passed. cipher.sh: #21: RC2 ECB Encrypt - PASSED cipher.sh: RC2 ECB Decrypt -------------------------------- bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc2_ecb passed. cipher.sh: #22: RC2 ECB Decrypt - PASSED cipher.sh: RC2 CBC Encrypt -------------------------------- bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc2_cbc passed. cipher.sh: #23: RC2 CBC Encrypt - PASSED cipher.sh: RC2 CBC Decrypt -------------------------------- bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc2_cbc passed. cipher.sh: #24: RC2 CBC Decrypt - PASSED cipher.sh: RC4 Encrypt -------------------------------- bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. cipher.sh: #25: RC4 Encrypt - PASSED cipher.sh: RC4 Decrypt -------------------------------- bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. cipher.sh: #26: RC4 Decrypt - PASSED cipher.sh: RSA Encrypt -------------------------------- bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rsa passed. cipher.sh: #27: RSA Encrypt - PASSED cipher.sh: RSA Decrypt -------------------------------- bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rsa passed. cipher.sh: #28: RSA Decrypt - PASSED cipher.sh: DSA Sign -------------------------------- bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Signature self-test for dsa passed. cipher.sh: #29: DSA Sign - PASSED cipher.sh: DSA Verify -------------------------------- bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Verification self-test for dsa passed. cipher.sh: #30: DSA Verify - PASSED cipher.sh: MD2 Hash -------------------------------- bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for md2 passed. cipher.sh: #31: MD2 Hash - PASSED cipher.sh: MD5 Hash -------------------------------- bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for md5 passed. cipher.sh: #32: MD5 Hash - PASSED cipher.sh: SHA1 Hash -------------------------------- bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha1 passed. cipher.sh: #33: SHA1 Hash - PASSED cipher.sh: SHA224 Hash -------------------------------- bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. cipher.sh: #34: SHA224 Hash - PASSED cipher.sh: SHA256 Hash -------------------------------- bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. cipher.sh: #35: SHA256 Hash - PASSED cipher.sh: SHA384 Hash -------------------------------- bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. cipher.sh: #36: SHA384 Hash - PASSED cipher.sh: SHA512 Hash -------------------------------- bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. cipher.sh: #37: SHA512 Hash - PASSED TIMESTAMP cipher END: Mon Mar 26 17:41:17 EDT 2012 Running tests for libpkix TIMESTAMP libpkix BEGIN: Mon Mar 26 17:41:17 EDT 2012 TIMESTAMP libpkix END: Mon Mar 26 17:41:17 EDT 2012 Running tests for cert TIMESTAMP cert BEGIN: Mon Mar 26 17:41:17 EDT 2012 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #38: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #39: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #40: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #41: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -o root.cert cert.sh: #42: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #43: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #44: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #45: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #46: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #47: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #48: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #49: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #50: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #51: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #52: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #53: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #54: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #55: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #56: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #57: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #58: Exporting Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #59: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #60: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #63: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #64: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert cert.sh: #65: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert cert.sh: #66: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #67: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #68: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #69: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #70: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #71: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert cert.sh: #72: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #73: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #74: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert cert.sh: #75: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert cert.sh: #76: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #77: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #78: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #79: Import Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #80: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #81: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert cert.sh: #82: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #83: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #84: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #85: Import Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #86: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #87: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #88: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #89: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #90: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert cert.sh: #91: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #92: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #93: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #94: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #95: Import Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #96: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #97: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert cert.sh: #98: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #99: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #100: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #101: Import Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #102: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #103: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert cert.sh: #104: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #105: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #106: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #107: Import Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #108: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #109: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert cert.sh: #110: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #111: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #112: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #113: Import Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #114: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #115: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert cert.sh: #116: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #117: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #118: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #119: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #120: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #121: Import Eve's cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #122: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #123: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #124: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... cert.sh: #125: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #126: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #127: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #128: Import Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #129: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #130: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert cert.sh: #131: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:87 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:21 2012 Not After : Tue Jun 26 21:41:21 2012 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:a9:34:09:3a:82:c8:b5:4b:29:0b:e4:a2:f1:00:b4: 02:3e:d9:96:a2:03:48:9f:fb:7c:5d:67:21:7b:d5:b5: 9c:e1:49:3e:67:1b:f6:eb:9c:a6:16:91:14:a9:65:cb: f1:6d:5a:c8:12:5d:02:c8:44:bb:71:e6:a7:d8:21:c5: 79:0e:c6:72:f3:c9:5e:fb:7b:c8:7d:0e:0b:d7:f2:68: 91:78:6d:b2:0f:eb:d4:2f:5d:be:a2:2d:6b:08:f3:ac: 9f:68:74:76:f3:10:60:d3:f6:33:4f:05:95:e0:38:81: bf:9b:a4:3a:8e:8e:5e:5b:86:e2:03:99:9a:97:04:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 63:74:25:4b:ad:96:c5:8d:aa:da:0f:bf:f5:31:df:b5: f1:5d:4c:eb:84:82:37:53:d7:e0:92:41:38:2f:d3:ba: dc:7f:32:5f:7f:95:88:55:02:77:a5:64:29:02:3f:72: 92:69:c0:af:e2:66:78:d5:33:7b:09:c7:1c:16:63:02: e0:6b:53:48:19:7f:f2:bf:c0:c0:9e:99:da:20:80:99: 48:0a:8c:b6:a6:2b:18:89:fc:8b:61:9e:06:3d:ff:1f: 78:6b:ef:e6:57:ab:61:7b:06:2c:79:a3:11:a7:7d:66: 2d:b4:2f:cb:3a:80:31:71:c2:bb:a7:38:c8:32:14:7b Fingerprint (MD5): C3:EA:25:F9:46:C2:47:75:5F:8E:D7:FF:D3:E8:E3:DC Fingerprint (SHA1): 7B:42:50:4E:52:32:B1:E2:01:F0:BD:EA:32:E3:A4:20:6E:F5:19:0B Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #132: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:87 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:22 2012 Not After : Tue Jun 26 21:41:22 2012 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:41:a1:fa:bf:0e:71:8e:d2:9d:ab:d3:68:33:82:45: 0f:57:3a:4e:5a:72:c6:3f:d0:8f:0d:f2:e8:3d:2a:77: 39:ec:d1:db:ba:a7:c9:24:6c:bc:95:aa:a8:d1:1b:93: 05:1a:5a:52:3c:1c:3e:75:9a:74:a7:7b:9f:75:f8:fe: 28:45:5c:42:89:03:14:c8:81:73:f9:61:0a:7f:17:35: a2:de:7b:8f:9e:b0:d6:37:74:1d:74:21:13:02:db:1e: d4:cf:c8:1b:36:70:5b:b2:47:3b:16:e3:fb:17:72:ba: 1e:aa:0e:a4:4c:e5:42:e9:d9:19:04:59:18:a0:fc:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8e:91:84:b9:03:7d:ba:cd:5a:c4:4e:27:fe:1b:4f:a0: 70:0a:78:73:c1:71:ba:0a:e7:31:ac:b2:52:c5:d5:9d: a4:ce:c2:3c:ca:1f:cf:a6:f8:57:81:a2:d0:1f:bf:8c: d1:e3:4e:85:a3:f5:89:4d:67:d8:10:18:eb:7f:41:93: 93:71:74:2c:8a:93:8f:ad:aa:8d:f2:7c:f8:24:68:11: 90:5b:0d:f2:b7:31:ab:61:26:32:66:be:ea:6c:20:fe: dd:2c:31:a3:b0:53:88:44:67:eb:41:cc:0c:59:57:a8: 24:76:3e:a5:e1:a4:b6:e0:e6:7e:15:cc:dc:1d:47:0b Fingerprint (MD5): 09:53:9D:71:A2:E4:EF:D2:06:55:3D:BC:25:10:3C:5D Fingerprint (SHA1): 4C:8D:88:7A:D4:DA:AC:96:5D:7E:05:47:08:6E:16:B0:CB:C9:19:DA Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #133: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:88 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:22 2012 Not After : Tue Jun 26 21:41:22 2012 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:39:df:40:66:3b:1c:93:b8:4b:49:40:9d:55:08:e8: 5d:bb:3c:07:8e:03:dc:9f:ff:76:42:26:21:96:9a:26: 2d:47:54:92:72:7a:2d:62:9e:5d:c6:ac:cf:be:67:2e: c1:d8:77:47:43:2f:39:4e:18:d2:8d:5b:ae:9f:c4:05: 69:37:b3:90:ae:5f:ad:b0:9c:0f:8a:07:00:ec:d9:b7: f8:94:78:c1:56:7b:b0:b3:5b:54:2e:da:5e:3b:29:91: 60:4c:e8:17:f9:30:63:d4:40:73:86:59:dc:0c:5f:9d: d3:3c:33:98:94:d5:04:37:28:f0:7d:77:f1:41:2d:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: aa:f0:cd:e9:7f:b6:30:30:53:aa:19:c0:7a:b5:d3:ff: 06:7f:5b:42:e2:a8:6f:e4:03:69:3d:b4:7d:0f:ce:17: 44:17:c2:9f:a6:f1:82:76:cb:75:72:40:f3:32:e8:46: cd:04:e1:50:01:06:9d:00:1c:b8:be:43:43:69:f2:c5: 92:60:2a:52:b6:ea:91:fd:8d:22:cf:0f:a5:7f:23:f0: 43:3f:e9:35:7d:71:48:02:7f:4f:86:31:fe:bf:40:b5: 6d:1c:6a:4f:a4:d5:19:d3:f1:1b:20:5e:4a:ab:08:5e: 00:38:6f:16:4f:16:2b:8e:14:e6:dc:78:c3:30:ef:7f Fingerprint (MD5): C9:3D:B7:60:95:DF:D0:7A:4F:7C:57:B6:75:20:65:C0 Fingerprint (SHA1): 4C:A9:2D:5A:0B:05:EE:3C:43:BE:34:D8:7C:F6:4E:0C:4E:25:B8:CD Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #134: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:88 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:22 2012 Not After : Tue Jun 26 21:41:22 2012 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:bc:14:3d:e8:9d:43:5b:57:94:e0:62:6e:fe:5a:bb: 71:b1:dd:5d:87:fe:e1:1f:78:d8:d7:30:66:9a:3c:b2: 0e:bf:d9:26:17:a1:c1:6e:16:35:da:fd:d1:b8:01:2a: 21:51:6d:bf:e5:f8:a3:99:b1:62:ef:c4:72:5d:48:ca: fe:25:6c:7c:8f:cb:af:e7:0e:ca:14:fd:3d:ad:29:55: 1f:e5:24:5f:32:c6:c1:e4:af:ee:22:c4:59:87:6d:38: a5:85:04:1b:08:ab:71:e4:54:a7:60:05:b8:c1:e9:65: 3b:4d:93:5f:c2:80:d0:97:dc:21:c2:f2:d7:80:6d:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 00:9d:fe:ae:7a:5a:f6:ad:a8:3e:04:40:83:a3:93:eb: 3c:39:cf:16:f6:f4:bb:ba:3e:9a:15:32:5e:54:23:06: 44:ef:30:a0:5c:3d:b0:cc:8a:25:dd:18:1f:cb:a4:33: 68:7c:45:e3:17:ff:a6:00:15:d8:b1:8e:c0:63:78:e9: 28:ac:e1:39:be:23:ba:c5:89:c7:a6:2d:da:d8:d6:b5: 1e:fc:d3:e5:a3:bb:f0:53:b9:f4:97:cc:f6:e3:8d:89: bc:e9:fe:db:da:8d:77:1f:c4:b4:e3:aa:37:4e:2f:7b: a4:fc:1a:9d:d8:fb:30:da:ff:28:e7:63:e8:a4:dc:8b Fingerprint (MD5): 0C:39:98:2A:63:71:2E:A7:C4:C5:F4:4D:1A:56:E9:D9 Fingerprint (SHA1): E7:B8:FA:E8:B0:A0:2B:74:D3:36:A7:9B:97:41:B6:7D:81:DA:09:0C Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #135: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:88 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:22 2012 Not After : Tue Jun 26 21:41:22 2012 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:b9:6f:1b:34:af:db:8e:8e:96:2a:6f:3c:af:f1:ea: 51:5e:bd:f6:60:74:28:46:b4:0e:e4:43:14:23:da:c7: 4d:b8:1d:9e:74:6f:d5:8d:6e:c3:d5:ce:65:b1:98:a7: d5:e8:95:7e:84:96:ff:8f:c8:c4:f8:93:03:b5:92:21: af:49:10:cd:48:0f:64:30:77:a2:31:ff:1c:a3:4d:7c: 9a:b3:29:94:99:10:81:84:a5:17:5d:e1:a8:27:6a:45: b4:a6:af:c1:55:22:54:74:69:04:ad:4a:25:99:a3:b5: b3:b2:2d:12:4c:d1:9f:be:70:66:a3:ef:e6:ad:8e:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 68:fe:35:c6:47:cc:5e:7f:a6:49:e6:35:49:e4:47:d1: 8a:19:77:98:c9:87:3f:c5:70:de:5b:92:4a:b7:6d:a8: 12:24:54:c8:fd:7f:cb:cd:0e:fa:60:9a:34:f5:a4:6b: 02:67:74:3e:56:e2:d8:38:7e:fd:2e:8f:4e:87:f9:cb: d5:4e:1a:8d:92:19:a7:71:85:11:d7:59:52:e3:2f:b1: c4:6a:cc:42:e2:2b:bb:9e:dc:0c:ba:4d:e7:2b:62:e0: 92:5f:19:79:23:57:00:4b:f8:25:7a:9b:45:07:72:6f: b0:6c:20:f5:aa:95:6d:21:55:5b:76:bc:2c:78:05:1e Fingerprint (MD5): 5E:7F:66:5A:E8:C2:5E:5D:3C:2B:82:AB:7B:C1:88:FB Fingerprint (SHA1): 65:6A:62:B5:FD:91:B1:DC:DD:46:65:AC:75:13:62:68:62:3C:9B:0C Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #136: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:89 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:23 2012 Not After : Tue Jun 26 21:41:23 2012 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:93:9e:0b:0e:50:84:32:82:c8:59:ae:53:af:ef:de: 76:33:67:e7:ff:f9:e0:0c:98:4e:c9:fe:ac:08:f4:30: 8c:e7:30:9e:70:d1:4e:b2:93:e1:5b:17:d2:bb:a7:49: 8e:cb:a0:fc:8f:b3:7d:19:72:69:61:f1:f4:03:db:2d: 01:55:be:47:25:42:24:32:54:94:56:12:68:30:89:c1: 09:3b:b9:7d:4b:81:da:ff:58:25:a0:15:ec:f7:d7:86: b3:c3:db:ed:91:54:5e:d0:4d:76:46:9a:b2:39:b5:a6: a3:e8:53:ff:ac:e3:d8:81:3f:85:22:8a:65:d1:b4:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 12:a5:f3:b5:54:73:31:be:d5:29:82:00:01:a2:1c:83: 8b:ec:48:d7:d6:08:db:47:ab:e2:14:cf:88:ae:fa:6c: df:23:13:76:57:c4:92:de:b2:5f:f8:25:00:78:6a:ad: 5f:c0:ca:5e:60:be:0c:9c:fb:7e:7e:de:e7:b8:b2:13: 8a:86:06:6a:36:84:d7:b8:48:08:c1:43:f7:1b:45:a4: aa:6e:04:c4:f6:6d:25:ef:0d:56:96:87:05:a6:49:c5: 49:84:d0:c8:c1:64:88:98:20:7e:09:de:f9:04:3e:e0: df:e5:b1:48:48:94:83:b9:6c:94:bd:29:6f:d9:0d:aa Fingerprint (MD5): FF:32:40:6E:32:98:56:64:0A:02:6C:31:03:EA:94:41 Fingerprint (SHA1): 93:06:FD:B6:7C:0E:6D:F3:94:32:13:A2:E6:64:FF:6D:4D:ED:A9:28 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #137: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:89 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:23 2012 Not After : Tue Jun 26 21:41:23 2012 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:dc:3b:5e:9b:7e:cf:c6:57:29:57:e8:9d:2a:53:c7: 2d:6b:2a:50:60:fe:42:a2:61:f8:7f:b8:d3:70:f0:5e: 28:18:11:e8:4d:80:0a:1f:fa:4d:5d:4a:9b:b3:13:b1: da:74:0d:04:9c:0a:15:28:45:48:26:72:74:3a:10:78: c2:99:75:15:85:bc:78:ef:af:a6:90:3f:f5:da:a7:d5: d1:49:37:93:26:d1:ae:d0:7c:8a:52:f1:40:2b:aa:78: 9f:39:45:44:ca:13:0a:3a:92:fd:c9:a2:0f:1d:f7:a9: a5:40:fd:03:b2:ae:44:fd:cd:f2:6a:9d:e6:c9:97:25 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0e:9f:c4:db:38:53:fe:d5:0d:85:20:46:8d:2c:3d:93: a4:c3:e0:ed:80:ef:9f:35:79:94:68:06:1a:82:b4:e1: 59:42:da:4f:4e:5b:73:b6:37:0e:05:5b:46:35:e6:a9: be:56:0f:5e:72:49:e5:f2:b6:6b:4e:5b:40:40:d7:53: c8:e6:e5:b9:28:fe:49:5c:19:92:df:ca:4d:f1:1f:21: 8c:36:7e:82:87:0e:ec:8c:73:55:ac:47:6a:25:85:d4: b0:c9:69:fc:00:56:5f:a1:d1:c6:77:63:06:1e:a5:a4: 17:1a:d6:58:22:78:30:f4:12:32:f6:fc:31:ce:ba:ff Fingerprint (MD5): B7:03:F8:81:9D:AB:81:AC:46:92:2E:16:F9:D1:55:2E Fingerprint (SHA1): 7A:9C:21:8C:24:FF:A2:F6:52:7E:C5:FC:37:C1:86:A1:A2:E4:77:A6 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #138: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:8a Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:23 2012 Not After : Tue Jun 26 21:41:23 2012 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:c3:4c:fe:cf:7c:08:74:e4:2a:b0:17:ed:eb:52:6e: 27:1a:13:82:65:28:ba:ae:f9:c8:23:74:d7:be:e9:2d: 98:fc:31:6b:8f:9d:e1:ee:47:e5:b8:05:59:c6:73:b1: 81:6d:ae:43:c5:60:7a:e9:3e:d0:09:06:12:95:bf:26: 52:da:f9:57:37:2a:1a:d5:1b:f3:7f:b7:0d:78:76:ba: b0:a7:f6:be:a9:90:72:d7:91:98:76:b1:8a:18:8c:f0: ab:c9:a2:93:5e:d0:ec:d6:bb:fd:46:56:7e:90:fa:a7: 4f:49:e8:a2:1b:6c:15:40:a0:ba:5f:47:e0:ea:e1:03 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:5f:8e:ff:a6:25:b0:51:65:f3:fe:98:9b:57:f4:ae: 14:34:07:4b:89:e5:f5:db:2b:3a:76:60:ed:ef:2c:bb: 65:79:24:98:6b:00:4e:8a:7e:ae:f1:65:3c:d1:eb:b2: 3a:bc:2d:e0:73:ce:be:70:6e:76:19:b9:17:80:79:0e: 45:7e:92:11:98:e1:d5:d9:c8:81:bd:d2:4a:2f:9e:e8: 97:f1:b2:27:41:71:05:a1:ea:ea:4e:fa:50:c1:d0:ff: 61:61:b2:25:a9:0b:21:c7:5a:8a:cd:98:30:ed:f9:bc: d7:42:df:36:ca:ee:25:b6:9c:e6:79:10:63:62:24:44 Fingerprint (MD5): AF:87:C9:72:FE:52:E5:86:82:75:15:78:56:C6:B2:45 Fingerprint (SHA1): 71:34:A1:75:D4:4C:E6:A3:93:90:42:47:26:01:5E:3D:B9:68:ED:05 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #139: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:8a Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:23 2012 Not After : Tue Jun 26 21:41:23 2012 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f9:c5:a9:b7:bf:7e:52:58:15:ec:38:14:19:36:f8: 70:7a:da:f7:d0:89:b4:a5:d3:70:f7:c1:0c:68:9b:ff: aa:f3:d3:e6:7f:1d:be:bc:38:64:92:0f:6d:89:73:3b: 9f:a4:58:e4:1c:ac:92:3c:15:cc:34:49:2f:44:2d:43: 92:75:4f:28:1f:a5:bd:06:ae:fc:ed:1d:ef:30:3a:2c: b5:97:a0:ba:26:12:58:e6:94:14:d2:ef:5b:80:1e:2c: 9e:97:76:b2:1e:44:8f:b5:06:8f:86:9b:11:28:2d:b0: d2:59:02:7f:bf:f6:b2:83:07:b9:61:09:89:3e:7f:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3a:c5:62:12:55:dd:e7:6a:6d:7c:b4:5b:0b:98:f3:c2: 1c:3e:5c:40:bc:99:75:67:c9:d0:28:8f:5a:c7:6f:ca: 32:ff:25:86:6a:33:44:fc:ea:71:5e:c2:4f:04:1f:c8: da:fd:e9:7f:f4:b5:0f:84:18:9e:fb:41:7f:4c:80:98: ea:55:d0:14:ca:de:29:0f:cd:98:be:fe:b3:c1:b4:eb: 1b:2d:00:2d:6e:0a:2c:4c:81:8c:f4:f8:86:f2:79:aa: a6:8b:f4:6f:1c:73:f7:78:4f:4c:da:7e:e5:f6:e4:58: cd:a1:89:d7:fa:ec:4b:34:2c:a3:ad:58:7d:4f:96:17 Fingerprint (MD5): B4:26:A1:BA:CA:A7:3A:A0:59:EF:1E:95:E1:A2:0A:10 Fingerprint (SHA1): 0B:F1:88:BC:7F:5B:A0:D7:75:75:89:1B:4E:EA:E4:07:20:11:2C:75 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #140: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:8b Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:23 2012 Not After : Tue Jun 26 21:41:23 2012 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:41:b8:c4:7e:26:a2:0d:ff:24:2f:67:92:14:a5:bf: 8a:2e:8a:32:d6:a2:f1:4c:f1:2f:da:54:78:c3:eb:1b: 0b:f8:04:02:02:88:c1:f1:8c:f9:9f:bb:d1:d4:75:03: 06:49:aa:27:bf:74:b2:cb:56:25:d7:d1:7e:6b:98:f8: 23:65:b5:79:2d:fa:a9:c8:6d:fc:f0:e2:24:b9:be:76: ac:35:ea:64:de:fe:ee:4f:1d:2a:16:ea:13:96:3c:dd: 00:6b:1e:de:9a:7c:a3:72:df:07:a1:b0:1d:e1:fc:3c: de:26:fc:d0:6c:a8:3f:16:25:e4:a6:65:b4:7e:b9:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7d:8a:ed:38:10:0a:36:19:3a:f0:93:2d:35:9e:86:65: 12:96:bf:0a:a3:32:99:64:d2:95:19:58:1e:4d:77:7b: 74:7f:42:dd:43:fa:db:00:ed:56:4f:d8:c7:74:7b:5f: 2d:e4:cb:b6:c0:2c:88:4d:9e:35:e9:cb:08:95:18:ea: f5:19:fb:6c:8a:6c:12:21:4c:c0:08:6a:8d:dc:f5:4a: 39:1e:a8:43:5b:58:fb:c9:7a:ef:02:ab:d3:ad:b4:03: 5e:b8:f5:e5:49:e1:fd:ef:59:ca:7c:c0:69:00:5b:08: 2b:80:a3:69:93:0e:59:cc:44:96:3b:c1:29:e1:2d:89 Fingerprint (MD5): 81:9A:F6:6A:2F:AE:83:09:99:0B:47:4A:5C:5A:6F:04 Fingerprint (SHA1): 2A:19:88:DC:E4:B0:7E:83:B8:B9:34:DD:B3:94:AD:54:70:B3:59:1E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #141: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:8b Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:41:24 2012 Not After : Tue Jun 26 21:41:24 2012 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:4b:52:69:2e:73:b2:38:fd:c5:8f:3d:24:38:eb:25: 44:19:5f:65:44:33:77:7f:e8:39:6f:2f:58:29:8b:5b: 20:4e:dd:74:24:8c:9b:5c:21:19:1f:ac:db:36:54:d9: 2d:7e:22:5c:c0:0d:b3:0d:b3:78:97:d6:e9:fb:28:25: cc:6e:35:59:be:c7:38:d7:da:86:b7:e7:4e:88:da:3a: d1:5c:bb:53:d6:bc:d7:43:81:39:4d:4c:75:1b:5e:51: b1:14:f7:cb:12:b1:45:34:7a:86:70:f0:1b:f5:99:f8: a8:84:90:0c:40:d7:29:a7:64:e2:70:2b:a2:0d:27:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ac:2e:3b:2d:32:da:06:f6:52:16:15:af:4a:c9:84:c1: 7e:19:a0:c1:ac:b6:ec:f2:37:7f:2a:bd:31:d1:40:9d: f8:5c:d5:ac:ca:1d:bb:64:de:bf:7b:5c:11:38:09:45: 62:2e:a1:2c:a9:36:af:38:57:55:35:43:f5:62:7e:54: bc:52:9a:5b:51:78:96:34:31:bc:70:2d:24:ce:b3:25: 1e:38:7c:de:67:5c:26:44:e8:58:6c:52:13:a7:aa:ab: be:d3:cb:30:86:14:e9:00:d9:13:b2:6e:c5:15:9d:e6: bb:08:f5:2b:34:69:0a:b9:92:3d:4b:16:57:22:4c:8f Fingerprint (MD5): B6:E9:85:6E:9C:E2:9D:82:17:6C:A0:AD:C3:84:45:CC Fingerprint (SHA1): FE:AF:07:E4:56:47:4C:06:AB:11:73:DF:92:CF:C9:F8:F6:32:E3:C2 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #142: Certificate Key Usage Extension (11) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #143: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #144: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #145: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #146: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #147: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... cert.sh: #148: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #149: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #150: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #151: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #152: Import Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #153: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #154: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert cert.sh: #155: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #156: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #157: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -o root.cert cert.sh: #158: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #159: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #160: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: `./req' and `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #161: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert cert.sh: #162: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #163: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #164: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #165: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #166: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #167: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #168: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #169: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #170: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #171: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #172: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #173: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #174: Verify Distrusted Cert for Object Signer - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #176: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert cert.sh: #177: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #178: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #179: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert cert.sh: #180: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #181: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #182: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert cert.sh: #183: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #184: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #185: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert cert.sh: #186: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #187: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #188: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert cert.sh: #189: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #190: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #191: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert cert.sh: #192: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #193: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #194: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert cert.sh: #195: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #196: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #197: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert cert.sh: #198: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #199: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #200: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert cert.sh: #201: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #202: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #203: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert cert.sh: #204: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #205: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #206: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert cert.sh: #207: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #208: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #209: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert cert.sh: #210: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #211: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #212: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert cert.sh: #213: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #214: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #215: Modify CRL by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #216: Modify CRL by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #217: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #218: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. cert.sh: #219: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #220: Importing CRL for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Mar 26 17:41:36 EDT 2012 Running tests for dbtests TIMESTAMP dbtests BEGIN: Mon Mar 26 17:41:36 EDT 2012 ./dbtests.sh: line 206: syntax error near unexpected token `then' ./dbtests.sh: line 206: ` if [[ $EUID -ne 0 ]] then' TIMESTAMP dbtests END: Mon Mar 26 17:41:36 EDT 2012 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 26 17:41:36 EDT 2012 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 88:b7:a9:e3:fc:e7:e5:50:53:19:e7:5c:4d:3a:df:8d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #222: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #223: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #224: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 02:cc:be:9e:a8:0d:1e:0b:76:87:7b:5d:71:3f:5c:a2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #225: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #226: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #227: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 57:b3:0c:7a:9b:ea:1b:c2:a2:30:65:77:c7:14:f8:08 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #228: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #229: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #230: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 45:62:46:9c:6e:0f:68:99:3a:87:27:15:a9:42:98:24 Iteration Count: 1 (0x1) tools.sh: #231: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a3:47:01:68:eb:49:05:6e:b3:a3:32:c6:73:f7:31:0d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #234: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #235: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #236: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:35:3a:24:56:01:fd:a3:6e:bf:15:05:bf:1c:01:2e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #237: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #238: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #239: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:80:69:f5:91:cc:cc:c2:e5:45:ef:a2:01:2d:17:42 Iteration Count: 1 (0x1) tools.sh: #240: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #241: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #242: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 49:c2:63:51:48:84:3d:ac:0f:58:9d:c0:a2:13:eb:e3 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:c3:da:29:bd:65:86:32:4d:e2:78:2e:79:3e:ef: f4:c4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 32:6b:c4:9b:2a:49:5f:d5:4e:7b:6b:19:0b:12:6c:11 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:55:e2:83:79:3b:a3:dc:fd:4f:09:03:82:3f:8c: 6f:a4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #246: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #247: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #248: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dd:2e:e7:6e:78:9b:ae:aa:0d:35:2c:de:bf:f3:a8:e8 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:29:72:a6:95:ad:64:fc:63:0f:c1:e9:24:23:02: 01:45 tools.sh: #249: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #250: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #251: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d5:3b:a3:a0:1a:93:28:1f:ff:34:92:cb:f1:4b:09:30 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:e1:ff:32:eb:e8:18:dd:a2:ef:9a:c7:c9:52:c9: 7c:a0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #252: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #253: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #254: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:d3:54:73:ce:53:38:45:65:f7:4a:1c:e4:51:a4:c5 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:7f:13:02:53:15:55:5a:8f:f8:6d:8f:5a:e8:54: c8:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 38:1e:4f:f4:77:80:f0:dd:3f:7f:1a:34:aa:47:85:e9 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:c3:3f:cd:a6:81:10:31:00:16:f1:f1:7d:06:8b: 38:d9 tools.sh: #258: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #259: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #260: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:27:82:62:87:07:25:97:3f:8a:c3:a5:76:43:b5:67 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1f:bf:ac:36:2b:62:f2:c4:cc:1c:e4:9a:05:32: 6d:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #261: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #262: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #263: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 31:b9:92:52:87:3a:a7:09:86:32:a3:cc:1e:70:4d:72 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:82:c5:54:05:40:42:98:29:02:7a:5b:82:68:9e: f8:25 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #264: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #265: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #266: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:63:2a:02:0a:3f:1a:ef:b6:b5:0f:24:48:25:b0:51 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:fc:34:f3:67:14:d9:5c:cf:21:f6:ac:ab:0d:43: 1c:16 tools.sh: #267: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 06:6b:53:d9:b5:2d:3e:da:0b:8a:62:1b:4c:4a:1c:12 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:56:63:0e:a5:ad:5d:bb:9c:56:54:fb:ee:75:53: a1:03 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #270: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #271: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #272: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9c:e4:76:45:ab:54:b0:7f:cb:94:77:0d:08:6e:9d:49 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:29:01:33:ae:13:60:29:31:20:86:b9:55:b5:e3: b2:29 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #273: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #274: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #275: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 05:84:f0:0f:ee:7f:be:4b:5c:ae:7e:62:4c:62:38:33 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:2e:fe:6f:fd:6d:83:7b:39:85:f3:94:25:cf:ff: f2:ce tools.sh: #276: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #277: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #278: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e2:8e:5e:fd:84:53:17:b7:7d:fd:43:76:09:4f:aa:9a Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:46:f7:58:0e:d7:7c:a6:fe:8c:61:d6:c6:af:f0: c6:3f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 48:12:70:b9:40:b7:dc:6a:57:ba:c9:24:65:6b:32:a4 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:39:cb:04:d8:4b:b5:37:da:00:bd:aa:8d:30:d2: 0c:8c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #282: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #283: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #284: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:89:ad:1b:10:01:52:a8:5b:c6:a1:19:d1:a7:63:d9 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:a2:b2:b6:3f:60:c1:56:be:94:c3:f7:ea:17:63: 83:08 tools.sh: #285: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #286: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #287: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4c:fa:f5:cf:e3:df:9d:58:cc:8e:02:c6:1b:09:1b:24 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:cc:22:25:6f:de:d2:b9:0f:98:2b:63:94:7b:ad: 28:d5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #288: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #289: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #290: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:54:c7:0f:1a:4f:35:df:89:04:24:dc:d5:d9:3e:9f Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:3d:5a:23:f2:c2:57:65:07:6a:d9:e1:53:0d:09: 1d:39 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7b:d6:f9:a4:e9:a3:d6:78:8c:53:d1:e4:ea:ea:c1:d0 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:b6:ae:b3:28:fb:85:21:cc:ea:57:5e:32:33:b2: d1:59 tools.sh: #294: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #295: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #296: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 0e:ca:20:65:77:4e:59:2d:ac:16:86:87:bf:a4:ba:21 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #297: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #298: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #299: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a3:e8:f7:37:25:25:f2:87:84:5c:02:5f:d4:cf:7a:e4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #300: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #301: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #302: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8e:94:01:b7:93:76:a5:ff:e3:47:fb:be:5a:5e:6d:4d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 3e:8f:c1:fc:42:b5:dd:dc:bf:e0:ef:3f:95:03:94:be Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #306: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #307: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #308: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 99:b7:cf:a2:8c:61:92:ce:8e:bd:4d:78:5a:bf:42:e1 Iteration Count: 1 (0x1) tools.sh: #309: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #310: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #311: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ed:e9:27:45:cc:19:31:ee:1e:fd:83:de:ba:da:4e:08 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #312: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #313: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #314: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ee:99:ac:a3:d2:27:e3:1b:f6:d7:04:a1:7d:23:bb:28 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 49:e4:31:8d:5c:d6:aa:fe:46:3b:0c:9d:d3:74:8e:e2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #318: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #319: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #320: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b9:7c:93:a4:ff:3a:67:db:65:b9:0a:4c:84:3a:9a:c2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #321: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #322: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #323: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: d8:a0:15:0d:d6:46:e3:8c:06:a8:b3:9f:49:45:7e:c7 Iteration Count: 1 (0x1) tools.sh: #324: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #325: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #326: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 73:14:6a:78:db:5e:62:90:32:68:0f:7e:f5:24:ed:5e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3c:52:36:85:a3:7d:b0:cc:da:20:2f:75:37:3f:a0:32 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #330: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #331: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #332: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e7:99:0e:a1:e6:2e:dd:9b:6e:1a:47:38:53:14:9d:99 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #333: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #334: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #335: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2f:b6:41:32:ab:11:58:14:a5:22:80:e7:74:16:b0:92 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #336: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #337: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #338: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7d:31:8f:93:d1:69:e1:86:59:ea:33:a4:00:e8:23:06 Iteration Count: 1 (0x1) tools.sh: #339: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: af:7d:a1:5a:ed:6d:63:74:1d:0f:79:89:e8:ea:f4:aa Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #342: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #343: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #344: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:10:2c:58:44:de:2e:3b:0c:44:ae:ec:1f:f5:d9:44 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #345: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #346: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #347: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:7e:58:47:5f:bd:a7:4c:87:05:4e:4b:61:2f:fb:65 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #348: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #349: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #350: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 39:0e:88:1e:6b:7f:ca:91:ff:c0:df:28:91:cb:18:53 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #351: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:12:40:f0:6f:d2:45:be:eb:79:84:9e:d0:81:65:68 Iteration Count: 1 (0x1) tools.sh: #354: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #355: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #356: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e9:06:4a:d3:52:a5:a1:6e:a4:1c:bb:fd:09:4c:54:32 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #357: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #358: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #359: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bd:d4:cd:63:b1:7b:c9:5f:3a:5e:90:b5:a3:aa:4d:d2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #360: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #361: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #362: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 84:ec:3d:94:0a:bd:7e:71:bf:8b:27:9a:00:64:52:71 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:4f:15:e6:8e:98:52:c1:d5:9a:de:c6:fd:df:50:88 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #366: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #367: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #368: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c7:c6:1a:95:7c:a9:8e:bd:11:b4:04:90:3a:fa:9b:c2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #369: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #370: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #371: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 47:0e:06:4b:cd:6d:bc:98:95:a9:0f:1c:d7:d4:f9:ad Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #372: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #373: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #374: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7f:31:6c:65:ad:d9:2d:95:49:24:fb:27:0f:41:92:67 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:f9:da:9c:af:dd:08:91:f9:da:a9:7c:a7:f9:c1:19 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #378: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #379: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #380: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bc:cd:ad:01:54:95:7f:ca:12:06:3a:2a:41:1a:f4:e9 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #381: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #382: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #383: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:9f:15:91:59:ec:01:a0:3b:dc:b2:71:34:68:8b:a4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #384: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #385: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #386: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #387: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #388: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #389: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #390: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #391: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #392: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #393: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #394: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Mar 26 17:41:41 EDT 2012 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 26 17:41:41 EDT 2012 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #395: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #396: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1ff02389275f4899ec8a11a67ce777db78fde02a NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #397: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #398: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #399: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #400: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #401: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #402: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #403: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #404: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #405: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #406: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #407: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1ff02389275f4899ec8a11a67ce777db78fde02a FIPS_PUB_140_Test_Certificate fips.sh: #408: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #409: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #410: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #411: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #412: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1ff02389275f4899ec8a11a67ce777db78fde02a FIPS_PUB_140_Test_Certificate fips.sh: #413: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #414: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #415: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000f3d73 (998771): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #416: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 26 17:41:49 EDT 2012 Running tests for sdr TIMESTAMP sdr BEGIN: Mon Mar 26 17:41:49 EDT 2012 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v1.18664 -t "Test1" sdr.sh: #417: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v2.18664 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #418: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v3.18664 -t "1234567" sdr.sh: #419: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v1.18664 -t "Test1" sdr.sh: #420: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v2.18664 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #421: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v3.18664 -t "1234567" sdr.sh: #422: Decrypt - Value 3 - PASSED TIMESTAMP sdr END: Mon Mar 26 17:41:49 EDT 2012 Running tests for crmf TIMESTAMP crmf BEGIN: Mon Mar 26 17:41:49 EDT 2012 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #423: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #424: CMMF test . - PASSED TIMESTAMP crmf END: Mon Mar 26 17:41:49 EDT 2012 Running tests for smime TIMESTAMP smime BEGIN: Mon Mar 26 17:41:49 EDT 2012 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #425: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #426: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #427: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #428: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #429: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #430: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #431: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #432: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #433: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #434: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #435: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #436: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #437: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #438: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #439: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #440: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #441: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #442: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #443: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #444: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #445: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #446: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #447: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #448: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #449: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #450: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #451: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #452: Decrypt with a Multiple Email cert . - PASSED smime.sh: #453: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #454: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #455: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #456: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #457: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #458: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #459: Decode Encrypted-Data . - PASSED smime.sh: #460: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #461: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #462: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #463: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #464: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #465: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Mar 26 17:41:51 EDT 2012 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 26 17:41:51 EDT 2012 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32626 >/dev/null 2>/dev/null selfserv_9793 with PID 32626 found at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 with PID 32626 started at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #466: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 32626 at Mon Mar 26 17:41:51 EDT 2012 kill -USR1 32626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32626 killed at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32682 >/dev/null 2>/dev/null selfserv_9793 with PID 32682 found at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 with PID 32682 started at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #467: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 32682 at Mon Mar 26 17:41:51 EDT 2012 kill -USR1 32682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32682 killed at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32738 >/dev/null 2>/dev/null selfserv_9793 with PID 32738 found at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 with PID 32738 started at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #468: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 32738 at Mon Mar 26 17:41:51 EDT 2012 kill -USR1 32738 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32738 killed at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 343 >/dev/null 2>/dev/null selfserv_9793 with PID 343 found at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 with PID 343 started at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #469: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 343 at Mon Mar 26 17:41:51 EDT 2012 kill -USR1 343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 343 killed at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 401 >/dev/null 2>/dev/null selfserv_9793 with PID 401 found at Mon Mar 26 17:41:51 EDT 2012 selfserv_9793 with PID 401 started at Mon Mar 26 17:41:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #470: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 401 at Mon Mar 26 17:41:51 EDT 2012 kill -USR1 401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 401 killed at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 457 >/dev/null 2>/dev/null selfserv_9793 with PID 457 found at Mon Mar 26 17:41:52 EDT 2012 selfserv_9793 with PID 457 started at Mon Mar 26 17:41:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #471: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 457 at Mon Mar 26 17:41:52 EDT 2012 kill -USR1 457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 457 killed at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 525 >/dev/null 2>/dev/null selfserv_9793 with PID 525 found at Mon Mar 26 17:41:52 EDT 2012 selfserv_9793 with PID 525 started at Mon Mar 26 17:41:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #472: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 525 at Mon Mar 26 17:41:52 EDT 2012 kill -USR1 525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 525 killed at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 581 >/dev/null 2>/dev/null selfserv_9793 with PID 581 found at Mon Mar 26 17:41:52 EDT 2012 selfserv_9793 with PID 581 started at Mon Mar 26 17:41:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #473: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 581 at Mon Mar 26 17:41:52 EDT 2012 kill -USR1 581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 581 killed at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 637 >/dev/null 2>/dev/null selfserv_9793 with PID 637 found at Mon Mar 26 17:41:52 EDT 2012 selfserv_9793 with PID 637 started at Mon Mar 26 17:41:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #474: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 637 at Mon Mar 26 17:41:52 EDT 2012 kill -USR1 637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 637 killed at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 706 >/dev/null 2>/dev/null selfserv_9793 with PID 706 found at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 with PID 706 started at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #475: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 706 at Mon Mar 26 17:41:53 EDT 2012 kill -USR1 706 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 706 killed at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 762 >/dev/null 2>/dev/null selfserv_9793 with PID 762 found at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 with PID 762 started at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #476: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 762 at Mon Mar 26 17:41:53 EDT 2012 kill -USR1 762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 762 killed at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 821 >/dev/null 2>/dev/null selfserv_9793 with PID 821 found at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 with PID 821 started at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #477: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 821 at Mon Mar 26 17:41:53 EDT 2012 kill -USR1 821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 821 killed at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 889 >/dev/null 2>/dev/null selfserv_9793 with PID 889 found at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 with PID 889 started at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #478: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 889 at Mon Mar 26 17:41:53 EDT 2012 kill -USR1 889 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 889 killed at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 945 >/dev/null 2>/dev/null selfserv_9793 with PID 945 found at Mon Mar 26 17:41:53 EDT 2012 selfserv_9793 with PID 945 started at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #479: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 945 at Mon Mar 26 17:41:54 EDT 2012 kill -USR1 945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 945 killed at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1001 >/dev/null 2>/dev/null selfserv_9793 with PID 1001 found at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 with PID 1001 started at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #480: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 1001 at Mon Mar 26 17:41:54 EDT 2012 kill -USR1 1001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1001 killed at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1070 >/dev/null 2>/dev/null selfserv_9793 with PID 1070 found at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 with PID 1070 started at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #481: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 1070 at Mon Mar 26 17:41:54 EDT 2012 kill -USR1 1070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1070 killed at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1126 >/dev/null 2>/dev/null selfserv_9793 with PID 1126 found at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 with PID 1126 started at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #482: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 1126 at Mon Mar 26 17:41:54 EDT 2012 kill -USR1 1126 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1126 killed at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1185 >/dev/null 2>/dev/null selfserv_9793 with PID 1185 found at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 with PID 1185 started at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #483: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 1185 at Mon Mar 26 17:41:54 EDT 2012 kill -USR1 1185 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1185 killed at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1257 >/dev/null 2>/dev/null selfserv_9793 with PID 1257 found at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 with PID 1257 started at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #484: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 1257 at Mon Mar 26 17:41:54 EDT 2012 kill -USR1 1257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1257 killed at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1378 >/dev/null 2>/dev/null selfserv_9793 with PID 1378 found at Mon Mar 26 17:41:54 EDT 2012 selfserv_9793 with PID 1378 started at Mon Mar 26 17:41:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #485: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 1378 at Mon Mar 26 17:41:55 EDT 2012 kill -USR1 1378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1378 killed at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1434 >/dev/null 2>/dev/null selfserv_9793 with PID 1434 found at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 with PID 1434 started at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #486: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 1434 at Mon Mar 26 17:41:55 EDT 2012 kill -USR1 1434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1434 killed at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1502 >/dev/null 2>/dev/null selfserv_9793 with PID 1502 found at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 with PID 1502 started at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #487: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 1502 at Mon Mar 26 17:41:55 EDT 2012 kill -USR1 1502 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1502 killed at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1558 >/dev/null 2>/dev/null selfserv_9793 with PID 1558 found at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 with PID 1558 started at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #488: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 1558 at Mon Mar 26 17:41:55 EDT 2012 kill -USR1 1558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1558 killed at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1614 >/dev/null 2>/dev/null selfserv_9793 with PID 1614 found at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 with PID 1614 started at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #489: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 1614 at Mon Mar 26 17:41:55 EDT 2012 kill -USR1 1614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1614 killed at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1682 >/dev/null 2>/dev/null selfserv_9793 with PID 1682 found at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 with PID 1682 started at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #490: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 1682 at Mon Mar 26 17:41:55 EDT 2012 kill -USR1 1682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1682 killed at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1738 >/dev/null 2>/dev/null selfserv_9793 with PID 1738 found at Mon Mar 26 17:41:55 EDT 2012 selfserv_9793 with PID 1738 started at Mon Mar 26 17:41:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #491: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 1738 at Mon Mar 26 17:41:56 EDT 2012 kill -USR1 1738 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1738 killed at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1794 >/dev/null 2>/dev/null selfserv_9793 with PID 1794 found at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 with PID 1794 started at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #492: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 1794 at Mon Mar 26 17:41:56 EDT 2012 kill -USR1 1794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1794 killed at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1862 >/dev/null 2>/dev/null selfserv_9793 with PID 1862 found at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 with PID 1862 started at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #493: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 1862 at Mon Mar 26 17:41:56 EDT 2012 kill -USR1 1862 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1862 killed at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1918 >/dev/null 2>/dev/null selfserv_9793 with PID 1918 found at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 with PID 1918 started at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #494: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 1918 at Mon Mar 26 17:41:56 EDT 2012 kill -USR1 1918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1918 killed at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 1974 >/dev/null 2>/dev/null selfserv_9793 with PID 1974 found at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 with PID 1974 started at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #495: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 1974 at Mon Mar 26 17:41:56 EDT 2012 kill -USR1 1974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 1974 killed at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2042 >/dev/null 2>/dev/null selfserv_9793 with PID 2042 found at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 with PID 2042 started at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #496: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 2042 at Mon Mar 26 17:41:56 EDT 2012 kill -USR1 2042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2042 killed at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2098 >/dev/null 2>/dev/null selfserv_9793 with PID 2098 found at Mon Mar 26 17:41:56 EDT 2012 selfserv_9793 with PID 2098 started at Mon Mar 26 17:41:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #497: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 2098 at Mon Mar 26 17:41:57 EDT 2012 kill -USR1 2098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2098 killed at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2154 >/dev/null 2>/dev/null selfserv_9793 with PID 2154 found at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 with PID 2154 started at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #498: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 2154 at Mon Mar 26 17:41:57 EDT 2012 kill -USR1 2154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2154 killed at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2222 >/dev/null 2>/dev/null selfserv_9793 with PID 2222 found at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 with PID 2222 started at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #499: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 2222 at Mon Mar 26 17:41:57 EDT 2012 kill -USR1 2222 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2222 killed at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2278 >/dev/null 2>/dev/null selfserv_9793 with PID 2278 found at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 with PID 2278 started at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #500: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2278 at Mon Mar 26 17:41:57 EDT 2012 kill -USR1 2278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2278 killed at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2334 >/dev/null 2>/dev/null selfserv_9793 with PID 2334 found at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 with PID 2334 started at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #501: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 2334 at Mon Mar 26 17:41:57 EDT 2012 kill -USR1 2334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2334 killed at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2402 >/dev/null 2>/dev/null selfserv_9793 with PID 2402 found at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 with PID 2402 started at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #502: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2402 at Mon Mar 26 17:41:57 EDT 2012 kill -USR1 2402 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2402 killed at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2458 >/dev/null 2>/dev/null selfserv_9793 with PID 2458 found at Mon Mar 26 17:41:57 EDT 2012 selfserv_9793 with PID 2458 started at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #503: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2458 at Mon Mar 26 17:41:58 EDT 2012 kill -USR1 2458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2458 killed at Mon Mar 26 17:41:58 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2514 >/dev/null 2>/dev/null selfserv_9793 with PID 2514 found at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 with PID 2514 started at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #504: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2514 at Mon Mar 26 17:41:58 EDT 2012 kill -USR1 2514 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2514 killed at Mon Mar 26 17:41:58 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2582 >/dev/null 2>/dev/null selfserv_9793 with PID 2582 found at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 with PID 2582 started at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #505: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2582 at Mon Mar 26 17:41:58 EDT 2012 kill -USR1 2582 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2582 killed at Mon Mar 26 17:41:58 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2638 >/dev/null 2>/dev/null selfserv_9793 with PID 2638 found at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 with PID 2638 started at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #506: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2638 at Mon Mar 26 17:41:58 EDT 2012 kill -USR1 2638 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2638 killed at Mon Mar 26 17:41:58 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2694 >/dev/null 2>/dev/null selfserv_9793 with PID 2694 found at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 with PID 2694 started at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #507: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2694 at Mon Mar 26 17:41:58 EDT 2012 kill -USR1 2694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2694 killed at Mon Mar 26 17:41:58 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2762 >/dev/null 2>/dev/null selfserv_9793 with PID 2762 found at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 with PID 2762 started at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #508: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2762 at Mon Mar 26 17:41:58 EDT 2012 kill -USR1 2762 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2762 killed at Mon Mar 26 17:41:58 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2818 >/dev/null 2>/dev/null selfserv_9793 with PID 2818 found at Mon Mar 26 17:41:59 EDT 2012 selfserv_9793 with PID 2818 started at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #509: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2818 at Mon Mar 26 17:41:59 EDT 2012 kill -USR1 2818 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2818 killed at Mon Mar 26 17:41:59 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2874 >/dev/null 2>/dev/null selfserv_9793 with PID 2874 found at Mon Mar 26 17:41:59 EDT 2012 selfserv_9793 with PID 2874 started at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #510: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2874 at Mon Mar 26 17:41:59 EDT 2012 kill -USR1 2874 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2874 killed at Mon Mar 26 17:41:59 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2942 >/dev/null 2>/dev/null selfserv_9793 with PID 2942 found at Mon Mar 26 17:41:59 EDT 2012 selfserv_9793 with PID 2942 started at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #511: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2942 at Mon Mar 26 17:41:59 EDT 2012 kill -USR1 2942 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2942 killed at Mon Mar 26 17:41:59 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2998 >/dev/null 2>/dev/null selfserv_9793 with PID 2998 found at Mon Mar 26 17:41:59 EDT 2012 selfserv_9793 with PID 2998 started at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #512: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2998 at Mon Mar 26 17:41:59 EDT 2012 kill -USR1 2998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2998 killed at Mon Mar 26 17:41:59 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:41:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3054 >/dev/null 2>/dev/null selfserv_9793 with PID 3054 found at Mon Mar 26 17:41:59 EDT 2012 selfserv_9793 with PID 3054 started at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #513: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3054 at Mon Mar 26 17:41:59 EDT 2012 kill -USR1 3054 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3054 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3122 >/dev/null 2>/dev/null selfserv_9793 with PID 3122 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 with PID 3122 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #514: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3122 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 3122 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3122 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3178 >/dev/null 2>/dev/null selfserv_9793 with PID 3178 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 with PID 3178 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #515: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3178 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 3178 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3178 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3234 >/dev/null 2>/dev/null selfserv_9793 with PID 3234 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 with PID 3234 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #516: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3234 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 3234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3234 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3302 >/dev/null 2>/dev/null selfserv_9793 with PID 3302 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 with PID 3302 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #517: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3302 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 3302 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3302 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3358 >/dev/null 2>/dev/null selfserv_9793 with PID 3358 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 with PID 3358 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #518: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3358 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 3358 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3358 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3414 >/dev/null 2>/dev/null selfserv_9793 with PID 3414 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9793 with PID 3414 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #519: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3414 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 3414 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3414 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3482 >/dev/null 2>/dev/null selfserv_9793 with PID 3482 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 with PID 3482 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #520: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3482 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 3482 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3482 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3538 >/dev/null 2>/dev/null selfserv_9793 with PID 3538 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 with PID 3538 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #521: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3538 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 3538 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3538 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3594 >/dev/null 2>/dev/null selfserv_9793 with PID 3594 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 with PID 3594 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #522: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3594 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 3594 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3594 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3662 >/dev/null 2>/dev/null selfserv_9793 with PID 3662 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 with PID 3662 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #523: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3662 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 3662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3662 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3718 >/dev/null 2>/dev/null selfserv_9793 with PID 3718 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 with PID 3718 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #524: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3718 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 3718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3718 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3774 >/dev/null 2>/dev/null selfserv_9793 with PID 3774 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9793 with PID 3774 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #525: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3774 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 3774 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3774 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3842 >/dev/null 2>/dev/null selfserv_9793 with PID 3842 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 with PID 3842 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #526: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3842 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 3842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3842 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3898 >/dev/null 2>/dev/null selfserv_9793 with PID 3898 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 with PID 3898 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #527: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3898 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 3898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3898 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3954 >/dev/null 2>/dev/null selfserv_9793 with PID 3954 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 with PID 3954 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #528: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3954 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 3954 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3954 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4022 >/dev/null 2>/dev/null selfserv_9793 with PID 4022 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 with PID 4022 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4022 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 4022 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4022 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4078 >/dev/null 2>/dev/null selfserv_9793 with PID 4078 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 with PID 4078 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4078 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 4078 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4078 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4134 >/dev/null 2>/dev/null selfserv_9793 with PID 4134 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9793 with PID 4134 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4134 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 4134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4134 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4202 >/dev/null 2>/dev/null selfserv_9793 with PID 4202 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 with PID 4202 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #532: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4202 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 4202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4202 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4258 >/dev/null 2>/dev/null selfserv_9793 with PID 4258 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 with PID 4258 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #533: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4258 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 4258 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4258 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4314 >/dev/null 2>/dev/null selfserv_9793 with PID 4314 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 with PID 4314 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #534: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4314 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 4314 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4314 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4382 >/dev/null 2>/dev/null selfserv_9793 with PID 4382 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 with PID 4382 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #535: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4382 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 4382 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4382 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4438 >/dev/null 2>/dev/null selfserv_9793 with PID 4438 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 with PID 4438 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #536: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4438 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 4438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4438 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4494 >/dev/null 2>/dev/null selfserv_9793 with PID 4494 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9793 with PID 4494 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #537: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4494 at Mon Mar 26 17:42:04 EDT 2012 kill -USR1 4494 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4494 killed at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9793 starting at Mon Mar 26 17:42:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 selfserv_9793 with PID 4566 started at Mon Mar 26 17:42:04 EDT 2012 Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #538: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #539: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #540: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #541: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #542: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #543: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #544: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #545: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #546: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #547: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: #548: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #549: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #550: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #551: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #552: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #553: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #554: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #555: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #556: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #557: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #558: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #559: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #560: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #561: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: #562: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #563: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #564: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #565: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #566: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #567: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #568: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #569: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #570: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #571: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #572: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #573: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #574: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #575: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: #576: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #577: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #578: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 4566 at Mon Mar 26 17:42:07 EDT 2012 kill -USR1 4566 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4566 killed at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 selfserv_9793 with PID 5986 started at Mon Mar 26 17:42:07 EDT 2012 Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #579: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #580: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #581: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #582: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #583: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #584: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #585: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #586: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #587: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #588: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #589: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #590: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #591: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #592: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #593: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #594: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #595: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #596: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #597: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #598: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #599: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #600: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #601: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #602: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #603: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #604: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #605: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #606: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #607: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #608: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #609: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #610: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #611: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #612: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #613: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #614: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #615: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #616: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #617: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #618: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5986 >/dev/null 2>/dev/null selfserv_9793 with PID 5986 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #619: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5986 at Mon Mar 26 17:42:10 EDT 2012 kill -USR1 5986 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5986 killed at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7412 >/dev/null 2>/dev/null selfserv_9793 with PID 7412 found at Mon Mar 26 17:42:10 EDT 2012 selfserv_9793 with PID 7412 started at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 7412 at Mon Mar 26 17:42:10 EDT 2012 kill -USR1 7412 ./ssl.sh: line 207: 7412 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7412 killed at Mon Mar 26 17:42:10 EDT 2012 selfserv_9793 starting at Mon Mar 26 17:42:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:10 EDT 2012 selfserv_9793 with PID 7454 started at Mon Mar 26 17:42:10 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #620: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #621: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #622: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #623: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #624: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #625: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #626: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #627: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #628: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #629: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #630: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #631: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #632: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #633: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #634: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #635: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #636: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #637: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #638: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #639: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #640: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #641: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #642: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #643: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #644: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #645: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #646: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #647: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #648: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #649: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #650: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #651: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #652: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #653: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #654: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #655: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #656: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #657: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #658: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #659: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7454 >/dev/null 2>/dev/null selfserv_9793 with PID 7454 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #660: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7454 at Mon Mar 26 17:42:13 EDT 2012 kill -USR1 7454 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7454 killed at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:13 EDT 2012 selfserv_9793 with PID 8885 started at Mon Mar 26 17:42:13 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #661: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #662: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #663: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #664: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #665: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #666: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #667: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #668: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #669: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #670: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #671: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #672: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #673: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #674: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #675: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #676: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #677: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #678: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #679: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #680: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #681: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #682: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #683: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #684: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #685: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #686: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #687: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #688: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #689: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #690: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #691: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #692: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #693: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #694: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #695: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #696: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #697: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #698: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #699: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #700: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8885 >/dev/null 2>/dev/null selfserv_9793 with PID 8885 found at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #701: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8885 at Mon Mar 26 17:42:16 EDT 2012 kill -USR1 8885 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8885 killed at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 10329 >/dev/null 2>/dev/null selfserv_9793 with PID 10329 found at Mon Mar 26 17:42:16 EDT 2012 selfserv_9793 with PID 10329 started at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 10329 at Mon Mar 26 17:42:16 EDT 2012 kill -USR1 10329 ./ssl.sh: line 207: 10329 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 10329 killed at Mon Mar 26 17:42:16 EDT 2012 selfserv_9793 starting at Mon Mar 26 17:42:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:16 EDT 2012 selfserv_9793 with PID 10371 started at Mon Mar 26 17:42:16 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #702: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #703: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #704: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #705: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #706: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #707: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #708: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #709: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #710: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #711: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #712: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #713: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #714: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #715: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #716: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #717: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #718: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #719: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #720: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #721: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #722: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #723: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #724: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #725: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #726: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:18 EDT 2012 ssl.sh: #727: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #728: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #729: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #730: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #731: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #732: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #733: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #734: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #735: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #736: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #737: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #738: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #739: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #740: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: #741: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10371 >/dev/null 2>/dev/null selfserv_9793 with PID 10371 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #742: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 10371 at Mon Mar 26 17:42:20 EDT 2012 kill -USR1 10371 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 10371 killed at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 selfserv_9793 with PID 11792 started at Mon Mar 26 17:42:20 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #743: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #744: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #745: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #746: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #747: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #748: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #749: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #750: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #751: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: #752: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #753: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #754: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #755: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #756: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #757: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #758: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #759: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #760: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #761: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #762: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #763: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #764: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #765: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: #766: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #767: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #768: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #769: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #770: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #771: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #772: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #773: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #774: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #775: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #776: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #777: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: #778: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: #779: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: #780: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: #781: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: #782: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11792 >/dev/null 2>/dev/null selfserv_9793 with PID 11792 found at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: #783: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 11792 at Mon Mar 26 17:42:23 EDT 2012 kill -USR1 11792 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11792 killed at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13212 >/dev/null 2>/dev/null selfserv_9793 with PID 13212 found at Mon Mar 26 17:42:23 EDT 2012 selfserv_9793 with PID 13212 started at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 13212 at Mon Mar 26 17:42:23 EDT 2012 kill -USR1 13212 ./ssl.sh: line 207: 13212 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13212 killed at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: SSL Cipher Coverage - server bypass/client normal =============================== selfserv_9793 starting at Mon Mar 26 17:42:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:23 EDT 2012 selfserv_9793 with PID 13260 started at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c A -T -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c B -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c C -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c D -T -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c E -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c F -T -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #790: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #791: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #792: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #793: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #794: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #795: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #796: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #797: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #798: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #799: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #800: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #801: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #802: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #803: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #804: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #805: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #806: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #807: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #808: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #809: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #810: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 13260 >/dev/null 2>/dev/null selfserv_9793 with PID 13260 found at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 13260 at Mon Mar 26 17:42:26 EDT 2012 kill -USR1 13260 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13260 killed at Mon Mar 26 17:42:26 EDT 2012 ssl.sh: SSL Client Authentication - server bypass/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:26 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14849 >/dev/null 2>/dev/null selfserv_9793 with PID 14849 found at Mon Mar 26 17:42:26 EDT 2012 selfserv_9793 with PID 14849 started at Mon Mar 26 17:42:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 14849 at Mon Mar 26 17:42:26 EDT 2012 kill -USR1 14849 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14849 killed at Mon Mar 26 17:42:26 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:26 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14907 >/dev/null 2>/dev/null selfserv_9793 with PID 14907 found at Mon Mar 26 17:42:26 EDT 2012 selfserv_9793 with PID 14907 started at Mon Mar 26 17:42:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 14907 at Mon Mar 26 17:42:26 EDT 2012 kill -USR1 14907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14907 killed at Mon Mar 26 17:42:26 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:26 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14964 >/dev/null 2>/dev/null selfserv_9793 with PID 14964 found at Mon Mar 26 17:42:26 EDT 2012 selfserv_9793 with PID 14964 started at Mon Mar 26 17:42:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 14964 at Mon Mar 26 17:42:27 EDT 2012 kill -USR1 14964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14964 killed at Mon Mar 26 17:42:27 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15021 >/dev/null 2>/dev/null selfserv_9793 with PID 15021 found at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 with PID 15021 started at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #821: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15021 at Mon Mar 26 17:42:27 EDT 2012 kill -USR1 15021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15021 killed at Mon Mar 26 17:42:27 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15078 >/dev/null 2>/dev/null selfserv_9793 with PID 15078 found at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 with PID 15078 started at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #822: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15078 at Mon Mar 26 17:42:27 EDT 2012 kill -USR1 15078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15078 killed at Mon Mar 26 17:42:27 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15135 >/dev/null 2>/dev/null selfserv_9793 with PID 15135 found at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 with PID 15135 started at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15135 at Mon Mar 26 17:42:27 EDT 2012 kill -USR1 15135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15135 killed at Mon Mar 26 17:42:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15192 >/dev/null 2>/dev/null selfserv_9793 with PID 15192 found at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 with PID 15192 started at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15192 at Mon Mar 26 17:42:27 EDT 2012 kill -USR1 15192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15192 killed at Mon Mar 26 17:42:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15250 >/dev/null 2>/dev/null selfserv_9793 with PID 15250 found at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 with PID 15250 started at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15250 at Mon Mar 26 17:42:27 EDT 2012 kill -USR1 15250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15250 killed at Mon Mar 26 17:42:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15313 >/dev/null 2>/dev/null selfserv_9793 with PID 15313 found at Mon Mar 26 17:42:27 EDT 2012 selfserv_9793 with PID 15313 started at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15313 at Mon Mar 26 17:42:28 EDT 2012 kill -USR1 15313 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15313 killed at Mon Mar 26 17:42:28 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15370 >/dev/null 2>/dev/null selfserv_9793 with PID 15370 found at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 with PID 15370 started at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #827: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15370 at Mon Mar 26 17:42:28 EDT 2012 kill -USR1 15370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15370 killed at Mon Mar 26 17:42:28 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15428 >/dev/null 2>/dev/null selfserv_9793 with PID 15428 found at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 with PID 15428 started at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #828: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15428 at Mon Mar 26 17:42:28 EDT 2012 kill -USR1 15428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15428 killed at Mon Mar 26 17:42:28 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15486 >/dev/null 2>/dev/null selfserv_9793 with PID 15486 found at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 with PID 15486 started at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15486 at Mon Mar 26 17:42:28 EDT 2012 kill -USR1 15486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15486 killed at Mon Mar 26 17:42:28 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15543 >/dev/null 2>/dev/null selfserv_9793 with PID 15543 found at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 with PID 15543 started at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15543 at Mon Mar 26 17:42:28 EDT 2012 kill -USR1 15543 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15543 killed at Mon Mar 26 17:42:28 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15600 >/dev/null 2>/dev/null selfserv_9793 with PID 15600 found at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 with PID 15600 started at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15600 at Mon Mar 26 17:42:28 EDT 2012 kill -USR1 15600 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15600 killed at Mon Mar 26 17:42:28 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15658 >/dev/null 2>/dev/null selfserv_9793 with PID 15658 found at Mon Mar 26 17:42:28 EDT 2012 selfserv_9793 with PID 15658 started at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15658 at Mon Mar 26 17:42:29 EDT 2012 kill -USR1 15658 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15658 killed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15715 >/dev/null 2>/dev/null selfserv_9793 with PID 15715 found at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 with PID 15715 started at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #833: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15715 at Mon Mar 26 17:42:29 EDT 2012 kill -USR1 15715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15715 killed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15772 >/dev/null 2>/dev/null selfserv_9793 with PID 15772 found at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 with PID 15772 started at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #834: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15772 at Mon Mar 26 17:42:29 EDT 2012 kill -USR1 15772 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15772 killed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15830 >/dev/null 2>/dev/null selfserv_9793 with PID 15830 found at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 with PID 15830 started at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15830 at Mon Mar 26 17:42:29 EDT 2012 kill -USR1 15830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15830 killed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15887 >/dev/null 2>/dev/null selfserv_9793 with PID 15887 found at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 with PID 15887 started at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15887 at Mon Mar 26 17:42:29 EDT 2012 kill -USR1 15887 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15887 killed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15944 >/dev/null 2>/dev/null selfserv_9793 with PID 15944 found at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 with PID 15944 started at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15944 at Mon Mar 26 17:42:29 EDT 2012 kill -USR1 15944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15944 killed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16003 >/dev/null 2>/dev/null selfserv_9793 with PID 16003 found at Mon Mar 26 17:42:29 EDT 2012 selfserv_9793 with PID 16003 started at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16003 at Mon Mar 26 17:42:30 EDT 2012 kill -USR1 16003 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16003 killed at Mon Mar 26 17:42:30 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16060 >/dev/null 2>/dev/null selfserv_9793 with PID 16060 found at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 with PID 16060 started at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #839: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16060 at Mon Mar 26 17:42:30 EDT 2012 kill -USR1 16060 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16060 killed at Mon Mar 26 17:42:30 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16117 >/dev/null 2>/dev/null selfserv_9793 with PID 16117 found at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 with PID 16117 started at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #840: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16117 at Mon Mar 26 17:42:30 EDT 2012 kill -USR1 16117 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16117 killed at Mon Mar 26 17:42:30 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16174 >/dev/null 2>/dev/null selfserv_9793 with PID 16174 found at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 with PID 16174 started at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16174 at Mon Mar 26 17:42:30 EDT 2012 kill -USR1 16174 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16174 killed at Mon Mar 26 17:42:30 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16299 >/dev/null 2>/dev/null selfserv_9793 with PID 16299 found at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 with PID 16299 started at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16299 at Mon Mar 26 17:42:30 EDT 2012 kill -USR1 16299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16299 killed at Mon Mar 26 17:42:30 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16362 >/dev/null 2>/dev/null selfserv_9793 with PID 16362 found at Mon Mar 26 17:42:30 EDT 2012 selfserv_9793 with PID 16362 started at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16362 at Mon Mar 26 17:42:31 EDT 2012 kill -USR1 16362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16362 killed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16425 >/dev/null 2>/dev/null selfserv_9793 with PID 16425 found at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 with PID 16425 started at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16425 at Mon Mar 26 17:42:31 EDT 2012 kill -USR1 16425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16425 killed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16488 >/dev/null 2>/dev/null selfserv_9793 with PID 16488 found at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 with PID 16488 started at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16488 at Mon Mar 26 17:42:31 EDT 2012 kill -USR1 16488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16488 killed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9793 starting at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16551 >/dev/null 2>/dev/null selfserv_9793 with PID 16551 found at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 with PID 16551 started at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16551 at Mon Mar 26 17:42:31 EDT 2012 kill -USR1 16551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16551 killed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16614 >/dev/null 2>/dev/null selfserv_9793 with PID 16614 found at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 with PID 16614 started at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16614 at Mon Mar 26 17:42:31 EDT 2012 kill -USR1 16614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16614 killed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16677 >/dev/null 2>/dev/null selfserv_9793 with PID 16677 found at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 with PID 16677 started at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16677 at Mon Mar 26 17:42:31 EDT 2012 kill -USR1 16677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16677 killed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:42:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16740 >/dev/null 2>/dev/null selfserv_9793 with PID 16740 found at Mon Mar 26 17:42:32 EDT 2012 selfserv_9793 with PID 16740 started at Mon Mar 26 17:42:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16740 at Mon Mar 26 17:42:32 EDT 2012 kill -USR1 16740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16740 killed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:42:32 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16803 >/dev/null 2>/dev/null selfserv_9793 with PID 16803 found at Mon Mar 26 17:42:32 EDT 2012 selfserv_9793 with PID 16803 started at Mon Mar 26 17:42:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16803 at Mon Mar 26 17:42:32 EDT 2012 kill -USR1 16803 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16803 killed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:42:32 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16866 >/dev/null 2>/dev/null selfserv_9793 with PID 16866 found at Mon Mar 26 17:42:32 EDT 2012 selfserv_9793 with PID 16866 started at Mon Mar 26 17:42:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16866 at Mon Mar 26 17:42:32 EDT 2012 kill -USR1 16866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16866 killed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: SSL Stress Test - server bypass/client normal =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:42:32 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17215 >/dev/null 2>/dev/null selfserv_9793 with PID 17215 found at Mon Mar 26 17:42:32 EDT 2012 selfserv_9793 with PID 17215 started at Mon Mar 26 17:42:32 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:42:33 EDT 2012 ssl.sh: #852: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17215 at Mon Mar 26 17:42:33 EDT 2012 kill -USR1 17215 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17215 killed at Mon Mar 26 17:42:33 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:42:33 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:33 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17291 >/dev/null 2>/dev/null selfserv_9793 with PID 17291 found at Mon Mar 26 17:42:33 EDT 2012 selfserv_9793 with PID 17291 started at Mon Mar 26 17:42:33 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:33 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:34 EDT 2012 ssl.sh: #853: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17291 at Mon Mar 26 17:42:34 EDT 2012 kill -USR1 17291 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17291 killed at Mon Mar 26 17:42:34 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:42:34 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17367 >/dev/null 2>/dev/null selfserv_9793 with PID 17367 found at Mon Mar 26 17:42:34 EDT 2012 selfserv_9793 with PID 17367 started at Mon Mar 26 17:42:34 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:34 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:34 EDT 2012 ssl.sh: #854: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17367 at Mon Mar 26 17:42:34 EDT 2012 kill -USR1 17367 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17367 killed at Mon Mar 26 17:42:34 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:42:34 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17443 >/dev/null 2>/dev/null selfserv_9793 with PID 17443 found at Mon Mar 26 17:42:34 EDT 2012 selfserv_9793 with PID 17443 started at Mon Mar 26 17:42:34 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:34 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:35 EDT 2012 ssl.sh: #855: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17443 at Mon Mar 26 17:42:35 EDT 2012 kill -USR1 17443 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17443 killed at Mon Mar 26 17:42:35 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:42:35 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17519 >/dev/null 2>/dev/null selfserv_9793 with PID 17519 found at Mon Mar 26 17:42:35 EDT 2012 selfserv_9793 with PID 17519 started at Mon Mar 26 17:42:35 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:35 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:35 EDT 2012 ssl.sh: #856: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17519 at Mon Mar 26 17:42:35 EDT 2012 kill -USR1 17519 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17519 killed at Mon Mar 26 17:42:35 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:42:35 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17595 >/dev/null 2>/dev/null selfserv_9793 with PID 17595 found at Mon Mar 26 17:42:35 EDT 2012 selfserv_9793 with PID 17595 started at Mon Mar 26 17:42:35 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:35 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:36 EDT 2012 ssl.sh: #857: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17595 at Mon Mar 26 17:42:36 EDT 2012 kill -USR1 17595 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17595 killed at Mon Mar 26 17:42:36 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:42:36 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17671 >/dev/null 2>/dev/null selfserv_9793 with PID 17671 found at Mon Mar 26 17:42:36 EDT 2012 selfserv_9793 with PID 17671 started at Mon Mar 26 17:42:36 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:36 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:37 EDT 2012 ssl.sh: #858: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17671 at Mon Mar 26 17:42:37 EDT 2012 kill -USR1 17671 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17671 killed at Mon Mar 26 17:42:37 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:42:37 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17747 >/dev/null 2>/dev/null selfserv_9793 with PID 17747 found at Mon Mar 26 17:42:37 EDT 2012 selfserv_9793 with PID 17747 started at Mon Mar 26 17:42:37 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:37 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:38 EDT 2012 ssl.sh: #859: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17747 at Mon Mar 26 17:42:38 EDT 2012 kill -USR1 17747 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17747 killed at Mon Mar 26 17:42:38 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9793 starting at Mon Mar 26 17:42:38 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:38 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17829 >/dev/null 2>/dev/null selfserv_9793 with PID 17829 found at Mon Mar 26 17:42:38 EDT 2012 selfserv_9793 with PID 17829 started at Mon Mar 26 17:42:38 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:38 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:38 EDT 2012 ssl.sh: #860: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17829 at Mon Mar 26 17:42:38 EDT 2012 kill -USR1 17829 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17829 killed at Mon Mar 26 17:42:38 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:38 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:38 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17926 >/dev/null 2>/dev/null selfserv_9793 with PID 17926 found at Mon Mar 26 17:42:38 EDT 2012 selfserv_9793 with PID 17926 started at Mon Mar 26 17:42:38 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:38 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:39 EDT 2012 ssl.sh: #861: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17926 at Mon Mar 26 17:42:39 EDT 2012 kill -USR1 17926 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17926 killed at Mon Mar 26 17:42:39 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:39 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:39 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18001 >/dev/null 2>/dev/null selfserv_9793 with PID 18001 found at Mon Mar 26 17:42:39 EDT 2012 selfserv_9793 with PID 18001 started at Mon Mar 26 17:42:39 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:39 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:40 EDT 2012 ssl.sh: #862: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18001 at Mon Mar 26 17:42:40 EDT 2012 kill -USR1 18001 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18001 killed at Mon Mar 26 17:42:40 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:40 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:40 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18076 >/dev/null 2>/dev/null selfserv_9793 with PID 18076 found at Mon Mar 26 17:42:40 EDT 2012 selfserv_9793 with PID 18076 started at Mon Mar 26 17:42:40 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:40 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:40 EDT 2012 ssl.sh: #863: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18076 at Mon Mar 26 17:42:40 EDT 2012 kill -USR1 18076 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18076 killed at Mon Mar 26 17:42:40 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:40 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:40 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18151 >/dev/null 2>/dev/null selfserv_9793 with PID 18151 found at Mon Mar 26 17:42:40 EDT 2012 selfserv_9793 with PID 18151 started at Mon Mar 26 17:42:40 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:40 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:40 EDT 2012 ssl.sh: #864: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18151 at Mon Mar 26 17:42:40 EDT 2012 kill -USR1 18151 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18151 killed at Mon Mar 26 17:42:40 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:40 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:40 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18227 >/dev/null 2>/dev/null selfserv_9793 with PID 18227 found at Mon Mar 26 17:42:40 EDT 2012 selfserv_9793 with PID 18227 started at Mon Mar 26 17:42:40 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:40 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:40 EDT 2012 ssl.sh: #865: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18227 at Mon Mar 26 17:42:41 EDT 2012 kill -USR1 18227 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18227 killed at Mon Mar 26 17:42:41 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:42:41 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18303 >/dev/null 2>/dev/null selfserv_9793 with PID 18303 found at Mon Mar 26 17:42:41 EDT 2012 selfserv_9793 with PID 18303 started at Mon Mar 26 17:42:41 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:41 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:41 EDT 2012 ssl.sh: #866: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18303 at Mon Mar 26 17:42:41 EDT 2012 kill -USR1 18303 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18303 killed at Mon Mar 26 17:42:41 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:41 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18379 >/dev/null 2>/dev/null selfserv_9793 with PID 18379 found at Mon Mar 26 17:42:41 EDT 2012 selfserv_9793 with PID 18379 started at Mon Mar 26 17:42:41 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:41 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:41 EDT 2012 ssl.sh: #867: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18379 at Mon Mar 26 17:42:41 EDT 2012 kill -USR1 18379 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18379 killed at Mon Mar 26 17:42:41 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:42:41 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18455 >/dev/null 2>/dev/null selfserv_9793 with PID 18455 found at Mon Mar 26 17:42:41 EDT 2012 selfserv_9793 with PID 18455 started at Mon Mar 26 17:42:41 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:41 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:41 EDT 2012 ssl.sh: #868: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18455 at Mon Mar 26 17:42:41 EDT 2012 kill -USR1 18455 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18455 killed at Mon Mar 26 17:42:41 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9793 starting at Mon Mar 26 17:42:41 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18537 >/dev/null 2>/dev/null selfserv_9793 with PID 18537 found at Mon Mar 26 17:42:41 EDT 2012 selfserv_9793 with PID 18537 started at Mon Mar 26 17:42:41 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:41 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:42 EDT 2012 ssl.sh: #869: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18537 at Mon Mar 26 17:42:42 EDT 2012 kill -USR1 18537 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18537 killed at Mon Mar 26 17:42:42 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9793 starting at Mon Mar 26 17:42:42 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:42 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18619 >/dev/null 2>/dev/null selfserv_9793 with PID 18619 found at Mon Mar 26 17:42:42 EDT 2012 selfserv_9793 with PID 18619 started at Mon Mar 26 17:42:42 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:42 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:43 EDT 2012 ssl.sh: #870: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18619 at Mon Mar 26 17:42:43 EDT 2012 kill -USR1 18619 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18619 killed at Mon Mar 26 17:42:43 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal =============================== selfserv_9793 starting at Mon Mar 26 17:42:43 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:43 EDT 2012 selfserv_9793 with PID 18776 started at Mon Mar 26 17:42:43 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 18776 >/dev/null 2>/dev/null selfserv_9793 with PID 18776 found at Mon Mar 26 17:42:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 18776 at Mon Mar 26 17:42:45 EDT 2012 kill -USR1 18776 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18776 killed at Mon Mar 26 17:42:45 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:45 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20244 >/dev/null 2>/dev/null selfserv_9793 with PID 20244 found at Mon Mar 26 17:42:45 EDT 2012 selfserv_9793 with PID 20244 started at Mon Mar 26 17:42:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20244 at Mon Mar 26 17:42:46 EDT 2012 kill -USR1 20244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20244 killed at Mon Mar 26 17:42:46 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20301 >/dev/null 2>/dev/null selfserv_9793 with PID 20301 found at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 with PID 20301 started at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20301 at Mon Mar 26 17:42:46 EDT 2012 kill -USR1 20301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20301 killed at Mon Mar 26 17:42:46 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20358 >/dev/null 2>/dev/null selfserv_9793 with PID 20358 found at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 with PID 20358 started at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20358 at Mon Mar 26 17:42:46 EDT 2012 kill -USR1 20358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20358 killed at Mon Mar 26 17:42:46 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20415 >/dev/null 2>/dev/null selfserv_9793 with PID 20415 found at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 with PID 20415 started at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #902: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20415 at Mon Mar 26 17:42:46 EDT 2012 kill -USR1 20415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20415 killed at Mon Mar 26 17:42:46 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20472 >/dev/null 2>/dev/null selfserv_9793 with PID 20472 found at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 with PID 20472 started at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #903: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20472 at Mon Mar 26 17:42:46 EDT 2012 kill -USR1 20472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20472 killed at Mon Mar 26 17:42:46 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20529 >/dev/null 2>/dev/null selfserv_9793 with PID 20529 found at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 with PID 20529 started at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20529 at Mon Mar 26 17:42:46 EDT 2012 kill -USR1 20529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20529 killed at Mon Mar 26 17:42:46 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20586 >/dev/null 2>/dev/null selfserv_9793 with PID 20586 found at Mon Mar 26 17:42:46 EDT 2012 selfserv_9793 with PID 20586 started at Mon Mar 26 17:42:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20586 at Mon Mar 26 17:42:47 EDT 2012 kill -USR1 20586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20586 killed at Mon Mar 26 17:42:47 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20643 >/dev/null 2>/dev/null selfserv_9793 with PID 20643 found at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 with PID 20643 started at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20643 at Mon Mar 26 17:42:47 EDT 2012 kill -USR1 20643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20643 killed at Mon Mar 26 17:42:47 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20700 >/dev/null 2>/dev/null selfserv_9793 with PID 20700 found at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 with PID 20700 started at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20700 at Mon Mar 26 17:42:47 EDT 2012 kill -USR1 20700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20700 killed at Mon Mar 26 17:42:47 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20757 >/dev/null 2>/dev/null selfserv_9793 with PID 20757 found at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 with PID 20757 started at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #908: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20757 at Mon Mar 26 17:42:47 EDT 2012 kill -USR1 20757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20757 killed at Mon Mar 26 17:42:47 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20814 >/dev/null 2>/dev/null selfserv_9793 with PID 20814 found at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 with PID 20814 started at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #909: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20814 at Mon Mar 26 17:42:47 EDT 2012 kill -USR1 20814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20814 killed at Mon Mar 26 17:42:47 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20871 >/dev/null 2>/dev/null selfserv_9793 with PID 20871 found at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 with PID 20871 started at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20871 at Mon Mar 26 17:42:47 EDT 2012 kill -USR1 20871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20871 killed at Mon Mar 26 17:42:47 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20928 >/dev/null 2>/dev/null selfserv_9793 with PID 20928 found at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 with PID 20928 started at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20928 at Mon Mar 26 17:42:48 EDT 2012 kill -USR1 20928 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20928 killed at Mon Mar 26 17:42:48 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20985 >/dev/null 2>/dev/null selfserv_9793 with PID 20985 found at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 with PID 20985 started at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20985 at Mon Mar 26 17:42:48 EDT 2012 kill -USR1 20985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20985 killed at Mon Mar 26 17:42:48 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21042 >/dev/null 2>/dev/null selfserv_9793 with PID 21042 found at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 with PID 21042 started at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 21042 at Mon Mar 26 17:42:48 EDT 2012 kill -USR1 21042 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21042 killed at Mon Mar 26 17:42:48 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21099 >/dev/null 2>/dev/null selfserv_9793 with PID 21099 found at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 with PID 21099 started at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #914: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 21099 at Mon Mar 26 17:42:48 EDT 2012 kill -USR1 21099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21099 killed at Mon Mar 26 17:42:48 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21156 >/dev/null 2>/dev/null selfserv_9793 with PID 21156 found at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 with PID 21156 started at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #915: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 21156 at Mon Mar 26 17:42:48 EDT 2012 kill -USR1 21156 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21156 killed at Mon Mar 26 17:42:48 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21213 >/dev/null 2>/dev/null selfserv_9793 with PID 21213 found at Mon Mar 26 17:42:48 EDT 2012 selfserv_9793 with PID 21213 started at Mon Mar 26 17:42:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 21213 at Mon Mar 26 17:42:48 EDT 2012 kill -USR1 21213 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21213 killed at Mon Mar 26 17:42:49 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21270 >/dev/null 2>/dev/null selfserv_9793 with PID 21270 found at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 with PID 21270 started at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 21270 at Mon Mar 26 17:42:49 EDT 2012 kill -USR1 21270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21270 killed at Mon Mar 26 17:42:49 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21327 >/dev/null 2>/dev/null selfserv_9793 with PID 21327 found at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 with PID 21327 started at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 21327 at Mon Mar 26 17:42:49 EDT 2012 kill -USR1 21327 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21327 killed at Mon Mar 26 17:42:49 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21384 >/dev/null 2>/dev/null selfserv_9793 with PID 21384 found at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 with PID 21384 started at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 21384 at Mon Mar 26 17:42:49 EDT 2012 kill -USR1 21384 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21384 killed at Mon Mar 26 17:42:49 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21441 >/dev/null 2>/dev/null selfserv_9793 with PID 21441 found at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 with PID 21441 started at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #920: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 21441 at Mon Mar 26 17:42:49 EDT 2012 kill -USR1 21441 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21441 killed at Mon Mar 26 17:42:49 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21498 >/dev/null 2>/dev/null selfserv_9793 with PID 21498 found at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 with PID 21498 started at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #921: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 21498 at Mon Mar 26 17:42:49 EDT 2012 kill -USR1 21498 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21498 killed at Mon Mar 26 17:42:49 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21555 >/dev/null 2>/dev/null selfserv_9793 with PID 21555 found at Mon Mar 26 17:42:49 EDT 2012 selfserv_9793 with PID 21555 started at Mon Mar 26 17:42:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 21555 at Mon Mar 26 17:42:50 EDT 2012 kill -USR1 21555 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21555 killed at Mon Mar 26 17:42:50 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client normal =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:42:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21990 >/dev/null 2>/dev/null selfserv_9793 with PID 21990 found at Mon Mar 26 17:42:50 EDT 2012 selfserv_9793 with PID 21990 started at Mon Mar 26 17:42:50 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:50 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:51 EDT 2012 ssl.sh: #923: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 21990 at Mon Mar 26 17:42:51 EDT 2012 kill -USR1 21990 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21990 killed at Mon Mar 26 17:42:51 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:42:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22066 >/dev/null 2>/dev/null selfserv_9793 with PID 22066 found at Mon Mar 26 17:42:51 EDT 2012 selfserv_9793 with PID 22066 started at Mon Mar 26 17:42:51 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:51 EDT 2012 ssl.sh: #924: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22066 at Mon Mar 26 17:42:51 EDT 2012 kill -USR1 22066 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22066 killed at Mon Mar 26 17:42:51 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:42:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22142 >/dev/null 2>/dev/null selfserv_9793 with PID 22142 found at Mon Mar 26 17:42:51 EDT 2012 selfserv_9793 with PID 22142 started at Mon Mar 26 17:42:51 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:52 EDT 2012 ssl.sh: #925: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22142 at Mon Mar 26 17:42:52 EDT 2012 kill -USR1 22142 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22142 killed at Mon Mar 26 17:42:52 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:42:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22218 >/dev/null 2>/dev/null selfserv_9793 with PID 22218 found at Mon Mar 26 17:42:52 EDT 2012 selfserv_9793 with PID 22218 started at Mon Mar 26 17:42:52 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:52 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:52 EDT 2012 ssl.sh: #926: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22218 at Mon Mar 26 17:42:52 EDT 2012 kill -USR1 22218 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22218 killed at Mon Mar 26 17:42:52 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:42:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22294 >/dev/null 2>/dev/null selfserv_9793 with PID 22294 found at Mon Mar 26 17:42:52 EDT 2012 selfserv_9793 with PID 22294 started at Mon Mar 26 17:42:52 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:52 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:53 EDT 2012 ssl.sh: #927: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22294 at Mon Mar 26 17:42:53 EDT 2012 kill -USR1 22294 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22294 killed at Mon Mar 26 17:42:53 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:42:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22370 >/dev/null 2>/dev/null selfserv_9793 with PID 22370 found at Mon Mar 26 17:42:53 EDT 2012 selfserv_9793 with PID 22370 started at Mon Mar 26 17:42:53 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:54 EDT 2012 ssl.sh: #928: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22370 at Mon Mar 26 17:42:54 EDT 2012 kill -USR1 22370 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22370 killed at Mon Mar 26 17:42:54 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:42:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22446 >/dev/null 2>/dev/null selfserv_9793 with PID 22446 found at Mon Mar 26 17:42:54 EDT 2012 selfserv_9793 with PID 22446 started at Mon Mar 26 17:42:54 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:55 EDT 2012 ssl.sh: #929: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22446 at Mon Mar 26 17:42:55 EDT 2012 kill -USR1 22446 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22446 killed at Mon Mar 26 17:42:55 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22551 >/dev/null 2>/dev/null selfserv_9793 with PID 22551 found at Mon Mar 26 17:42:55 EDT 2012 selfserv_9793 with PID 22551 started at Mon Mar 26 17:42:55 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:55 EDT 2012 ssl.sh: #930: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22551 at Mon Mar 26 17:42:55 EDT 2012 kill -USR1 22551 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22551 killed at Mon Mar 26 17:42:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22626 >/dev/null 2>/dev/null selfserv_9793 with PID 22626 found at Mon Mar 26 17:42:56 EDT 2012 selfserv_9793 with PID 22626 started at Mon Mar 26 17:42:56 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:56 EDT 2012 ssl.sh: #931: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22626 at Mon Mar 26 17:42:56 EDT 2012 kill -USR1 22626 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22626 killed at Mon Mar 26 17:42:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22701 >/dev/null 2>/dev/null selfserv_9793 with PID 22701 found at Mon Mar 26 17:42:56 EDT 2012 selfserv_9793 with PID 22701 started at Mon Mar 26 17:42:56 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:56 EDT 2012 ssl.sh: #932: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22701 at Mon Mar 26 17:42:56 EDT 2012 kill -USR1 22701 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22701 killed at Mon Mar 26 17:42:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22777 >/dev/null 2>/dev/null selfserv_9793 with PID 22777 found at Mon Mar 26 17:42:56 EDT 2012 selfserv_9793 with PID 22777 started at Mon Mar 26 17:42:56 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:56 EDT 2012 ssl.sh: #933: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22777 at Mon Mar 26 17:42:57 EDT 2012 kill -USR1 22777 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22777 killed at Mon Mar 26 17:42:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:42:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22853 >/dev/null 2>/dev/null selfserv_9793 with PID 22853 found at Mon Mar 26 17:42:57 EDT 2012 selfserv_9793 with PID 22853 started at Mon Mar 26 17:42:57 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:57 EDT 2012 ssl.sh: #934: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22853 at Mon Mar 26 17:42:57 EDT 2012 kill -USR1 22853 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22853 killed at Mon Mar 26 17:42:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:42:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22929 >/dev/null 2>/dev/null selfserv_9793 with PID 22929 found at Mon Mar 26 17:42:57 EDT 2012 selfserv_9793 with PID 22929 started at Mon Mar 26 17:42:57 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:57 EDT 2012 ssl.sh: #935: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22929 at Mon Mar 26 17:42:57 EDT 2012 kill -USR1 22929 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22929 killed at Mon Mar 26 17:42:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:42:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 23005 >/dev/null 2>/dev/null selfserv_9793 with PID 23005 found at Mon Mar 26 17:42:57 EDT 2012 selfserv_9793 with PID 23005 started at Mon Mar 26 17:42:57 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:57 EDT 2012 ssl.sh: #936: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 23005 at Mon Mar 26 17:42:57 EDT 2012 kill -USR1 23005 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 23005 killed at Mon Mar 26 17:42:57 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage - server normal/client bypass =============================== selfserv_9793 starting at Mon Mar 26 17:42:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:42:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:58 EDT 2012 selfserv_9793 with PID 23172 started at Mon Mar 26 17:42:58 EDT 2012 ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c A -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c B -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c C -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c D -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c E -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c F -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #944: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #945: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #946: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #947: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #948: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #949: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #950: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #951: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #952: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #953: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #954: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #955: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #956: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #957: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #958: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #959: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:42:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #960: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #961: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #962: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 23172 >/dev/null 2>/dev/null selfserv_9793 with PID 23172 found at Mon Mar 26 17:43:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 23172 at Mon Mar 26 17:43:00 EDT 2012 kill -USR1 23172 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 23172 killed at Mon Mar 26 17:43:00 EDT 2012 ssl.sh: SSL Client Authentication - server normal/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24757 >/dev/null 2>/dev/null selfserv_9793 with PID 24757 found at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 with PID 24757 started at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 24757 at Mon Mar 26 17:43:01 EDT 2012 kill -USR1 24757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24757 killed at Mon Mar 26 17:43:01 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24814 >/dev/null 2>/dev/null selfserv_9793 with PID 24814 found at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 with PID 24814 started at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 24814 at Mon Mar 26 17:43:01 EDT 2012 kill -USR1 24814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24814 killed at Mon Mar 26 17:43:01 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24871 >/dev/null 2>/dev/null selfserv_9793 with PID 24871 found at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 with PID 24871 started at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 24871 at Mon Mar 26 17:43:01 EDT 2012 kill -USR1 24871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24871 killed at Mon Mar 26 17:43:01 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24928 >/dev/null 2>/dev/null selfserv_9793 with PID 24928 found at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 with PID 24928 started at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #974: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 24928 at Mon Mar 26 17:43:01 EDT 2012 kill -USR1 24928 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24928 killed at Mon Mar 26 17:43:01 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24985 >/dev/null 2>/dev/null selfserv_9793 with PID 24985 found at Mon Mar 26 17:43:01 EDT 2012 selfserv_9793 with PID 24985 started at Mon Mar 26 17:43:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #975: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 24985 at Mon Mar 26 17:43:01 EDT 2012 kill -USR1 24985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24985 killed at Mon Mar 26 17:43:01 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25042 >/dev/null 2>/dev/null selfserv_9793 with PID 25042 found at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 with PID 25042 started at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25042 at Mon Mar 26 17:43:02 EDT 2012 kill -USR1 25042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25042 killed at Mon Mar 26 17:43:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25099 >/dev/null 2>/dev/null selfserv_9793 with PID 25099 found at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 with PID 25099 started at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25099 at Mon Mar 26 17:43:02 EDT 2012 kill -USR1 25099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25099 killed at Mon Mar 26 17:43:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25156 >/dev/null 2>/dev/null selfserv_9793 with PID 25156 found at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 with PID 25156 started at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25156 at Mon Mar 26 17:43:02 EDT 2012 kill -USR1 25156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25156 killed at Mon Mar 26 17:43:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25213 >/dev/null 2>/dev/null selfserv_9793 with PID 25213 found at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 with PID 25213 started at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25213 at Mon Mar 26 17:43:02 EDT 2012 kill -USR1 25213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25213 killed at Mon Mar 26 17:43:02 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25270 >/dev/null 2>/dev/null selfserv_9793 with PID 25270 found at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 with PID 25270 started at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #980: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25270 at Mon Mar 26 17:43:02 EDT 2012 kill -USR1 25270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25270 killed at Mon Mar 26 17:43:02 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25327 >/dev/null 2>/dev/null selfserv_9793 with PID 25327 found at Mon Mar 26 17:43:02 EDT 2012 selfserv_9793 with PID 25327 started at Mon Mar 26 17:43:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #981: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25327 at Mon Mar 26 17:43:03 EDT 2012 kill -USR1 25327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25327 killed at Mon Mar 26 17:43:03 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25384 >/dev/null 2>/dev/null selfserv_9793 with PID 25384 found at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 with PID 25384 started at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25384 at Mon Mar 26 17:43:03 EDT 2012 kill -USR1 25384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25384 killed at Mon Mar 26 17:43:03 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25441 >/dev/null 2>/dev/null selfserv_9793 with PID 25441 found at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 with PID 25441 started at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25441 at Mon Mar 26 17:43:03 EDT 2012 kill -USR1 25441 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25441 killed at Mon Mar 26 17:43:03 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25498 >/dev/null 2>/dev/null selfserv_9793 with PID 25498 found at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 with PID 25498 started at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25498 at Mon Mar 26 17:43:03 EDT 2012 kill -USR1 25498 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25498 killed at Mon Mar 26 17:43:03 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25555 >/dev/null 2>/dev/null selfserv_9793 with PID 25555 found at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 with PID 25555 started at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25555 at Mon Mar 26 17:43:03 EDT 2012 kill -USR1 25555 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25555 killed at Mon Mar 26 17:43:03 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25612 >/dev/null 2>/dev/null selfserv_9793 with PID 25612 found at Mon Mar 26 17:43:03 EDT 2012 selfserv_9793 with PID 25612 started at Mon Mar 26 17:43:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #986: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25612 at Mon Mar 26 17:43:03 EDT 2012 kill -USR1 25612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25612 killed at Mon Mar 26 17:43:04 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25670 >/dev/null 2>/dev/null selfserv_9793 with PID 25670 found at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 with PID 25670 started at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #987: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25670 at Mon Mar 26 17:43:04 EDT 2012 kill -USR1 25670 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25670 killed at Mon Mar 26 17:43:04 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25729 >/dev/null 2>/dev/null selfserv_9793 with PID 25729 found at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 with PID 25729 started at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25729 at Mon Mar 26 17:43:04 EDT 2012 kill -USR1 25729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25729 killed at Mon Mar 26 17:43:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25786 >/dev/null 2>/dev/null selfserv_9793 with PID 25786 found at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 with PID 25786 started at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25786 at Mon Mar 26 17:43:04 EDT 2012 kill -USR1 25786 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25786 killed at Mon Mar 26 17:43:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25843 >/dev/null 2>/dev/null selfserv_9793 with PID 25843 found at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 with PID 25843 started at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25843 at Mon Mar 26 17:43:04 EDT 2012 kill -USR1 25843 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25843 killed at Mon Mar 26 17:43:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25900 >/dev/null 2>/dev/null selfserv_9793 with PID 25900 found at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 with PID 25900 started at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25900 at Mon Mar 26 17:43:04 EDT 2012 kill -USR1 25900 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25900 killed at Mon Mar 26 17:43:04 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25957 >/dev/null 2>/dev/null selfserv_9793 with PID 25957 found at Mon Mar 26 17:43:04 EDT 2012 selfserv_9793 with PID 25957 started at Mon Mar 26 17:43:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #992: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25957 at Mon Mar 26 17:43:05 EDT 2012 kill -USR1 25957 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25957 killed at Mon Mar 26 17:43:05 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26014 >/dev/null 2>/dev/null selfserv_9793 with PID 26014 found at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 with PID 26014 started at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #993: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 26014 at Mon Mar 26 17:43:05 EDT 2012 kill -USR1 26014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26014 killed at Mon Mar 26 17:43:05 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26071 >/dev/null 2>/dev/null selfserv_9793 with PID 26071 found at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 with PID 26071 started at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 26071 at Mon Mar 26 17:43:05 EDT 2012 kill -USR1 26071 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26071 killed at Mon Mar 26 17:43:05 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26196 >/dev/null 2>/dev/null selfserv_9793 with PID 26196 found at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 with PID 26196 started at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 26196 at Mon Mar 26 17:43:05 EDT 2012 kill -USR1 26196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26196 killed at Mon Mar 26 17:43:05 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26259 >/dev/null 2>/dev/null selfserv_9793 with PID 26259 found at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 with PID 26259 started at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 26259 at Mon Mar 26 17:43:05 EDT 2012 kill -USR1 26259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26259 killed at Mon Mar 26 17:43:05 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26322 >/dev/null 2>/dev/null selfserv_9793 with PID 26322 found at Mon Mar 26 17:43:05 EDT 2012 selfserv_9793 with PID 26322 started at Mon Mar 26 17:43:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #997: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 26322 at Mon Mar 26 17:43:06 EDT 2012 kill -USR1 26322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26322 killed at Mon Mar 26 17:43:06 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26385 >/dev/null 2>/dev/null selfserv_9793 with PID 26385 found at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 with PID 26385 started at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 26385 at Mon Mar 26 17:43:06 EDT 2012 kill -USR1 26385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26385 killed at Mon Mar 26 17:43:06 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9793 starting at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26448 >/dev/null 2>/dev/null selfserv_9793 with PID 26448 found at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 with PID 26448 started at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #999: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 26448 at Mon Mar 26 17:43:06 EDT 2012 kill -USR1 26448 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26448 killed at Mon Mar 26 17:43:06 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26511 >/dev/null 2>/dev/null selfserv_9793 with PID 26511 found at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 with PID 26511 started at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 26511 at Mon Mar 26 17:43:06 EDT 2012 kill -USR1 26511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26511 killed at Mon Mar 26 17:43:06 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26574 >/dev/null 2>/dev/null selfserv_9793 with PID 26574 found at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 with PID 26574 started at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 26574 at Mon Mar 26 17:43:06 EDT 2012 kill -USR1 26574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26574 killed at Mon Mar 26 17:43:06 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26637 >/dev/null 2>/dev/null selfserv_9793 with PID 26637 found at Mon Mar 26 17:43:06 EDT 2012 selfserv_9793 with PID 26637 started at Mon Mar 26 17:43:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1002: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 26637 at Mon Mar 26 17:43:06 EDT 2012 kill -USR1 26637 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26637 killed at Mon Mar 26 17:43:06 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:43:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26700 >/dev/null 2>/dev/null selfserv_9793 with PID 26700 found at Mon Mar 26 17:43:07 EDT 2012 selfserv_9793 with PID 26700 started at Mon Mar 26 17:43:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1003: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 26700 at Mon Mar 26 17:43:07 EDT 2012 kill -USR1 26700 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26700 killed at Mon Mar 26 17:43:07 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:43:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26763 >/dev/null 2>/dev/null selfserv_9793 with PID 26763 found at Mon Mar 26 17:43:07 EDT 2012 selfserv_9793 with PID 26763 started at Mon Mar 26 17:43:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1004: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 26763 at Mon Mar 26 17:43:07 EDT 2012 kill -USR1 26763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26763 killed at Mon Mar 26 17:43:07 EDT 2012 ssl.sh: SSL Stress Test - server normal/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:43:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27112 >/dev/null 2>/dev/null selfserv_9793 with PID 27112 found at Mon Mar 26 17:43:07 EDT 2012 selfserv_9793 with PID 27112 started at Mon Mar 26 17:43:07 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:43:08 EDT 2012 ssl.sh: #1005: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27112 at Mon Mar 26 17:43:08 EDT 2012 kill -USR1 27112 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27112 killed at Mon Mar 26 17:43:08 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:43:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27188 >/dev/null 2>/dev/null selfserv_9793 with PID 27188 found at Mon Mar 26 17:43:08 EDT 2012 selfserv_9793 with PID 27188 started at Mon Mar 26 17:43:08 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:08 EDT 2012 ssl.sh: #1006: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27188 at Mon Mar 26 17:43:08 EDT 2012 kill -USR1 27188 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27188 killed at Mon Mar 26 17:43:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:43:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27264 >/dev/null 2>/dev/null selfserv_9793 with PID 27264 found at Mon Mar 26 17:43:08 EDT 2012 selfserv_9793 with PID 27264 started at Mon Mar 26 17:43:08 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:09 EDT 2012 ssl.sh: #1007: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27264 at Mon Mar 26 17:43:09 EDT 2012 kill -USR1 27264 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27264 killed at Mon Mar 26 17:43:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27340 >/dev/null 2>/dev/null selfserv_9793 with PID 27340 found at Mon Mar 26 17:43:09 EDT 2012 selfserv_9793 with PID 27340 started at Mon Mar 26 17:43:09 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:10 EDT 2012 ssl.sh: #1008: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27340 at Mon Mar 26 17:43:10 EDT 2012 kill -USR1 27340 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27340 killed at Mon Mar 26 17:43:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:43:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27416 >/dev/null 2>/dev/null selfserv_9793 with PID 27416 found at Mon Mar 26 17:43:10 EDT 2012 selfserv_9793 with PID 27416 started at Mon Mar 26 17:43:10 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:10 EDT 2012 ssl.sh: #1009: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27416 at Mon Mar 26 17:43:10 EDT 2012 kill -USR1 27416 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27416 killed at Mon Mar 26 17:43:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:43:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27492 >/dev/null 2>/dev/null selfserv_9793 with PID 27492 found at Mon Mar 26 17:43:10 EDT 2012 selfserv_9793 with PID 27492 started at Mon Mar 26 17:43:10 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:11 EDT 2012 ssl.sh: #1010: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27492 at Mon Mar 26 17:43:11 EDT 2012 kill -USR1 27492 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27492 killed at Mon Mar 26 17:43:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:43:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27568 >/dev/null 2>/dev/null selfserv_9793 with PID 27568 found at Mon Mar 26 17:43:11 EDT 2012 selfserv_9793 with PID 27568 started at Mon Mar 26 17:43:11 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:12 EDT 2012 ssl.sh: #1011: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27568 at Mon Mar 26 17:43:12 EDT 2012 kill -USR1 27568 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27568 killed at Mon Mar 26 17:43:12 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27644 >/dev/null 2>/dev/null selfserv_9793 with PID 27644 found at Mon Mar 26 17:43:12 EDT 2012 selfserv_9793 with PID 27644 started at Mon Mar 26 17:43:12 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:13 EDT 2012 ssl.sh: #1012: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27644 at Mon Mar 26 17:43:13 EDT 2012 kill -USR1 27644 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27644 killed at Mon Mar 26 17:43:13 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9793 starting at Mon Mar 26 17:43:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27726 >/dev/null 2>/dev/null selfserv_9793 with PID 27726 found at Mon Mar 26 17:43:13 EDT 2012 selfserv_9793 with PID 27726 started at Mon Mar 26 17:43:13 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:13 EDT 2012 ssl.sh: #1013: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27726 at Mon Mar 26 17:43:13 EDT 2012 kill -USR1 27726 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27726 killed at Mon Mar 26 17:43:14 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27823 >/dev/null 2>/dev/null selfserv_9793 with PID 27823 found at Mon Mar 26 17:43:14 EDT 2012 selfserv_9793 with PID 27823 started at Mon Mar 26 17:43:14 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:43:14 EDT 2012 ssl.sh: #1014: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27823 at Mon Mar 26 17:43:14 EDT 2012 kill -USR1 27823 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27823 killed at Mon Mar 26 17:43:14 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27898 >/dev/null 2>/dev/null selfserv_9793 with PID 27898 found at Mon Mar 26 17:43:14 EDT 2012 selfserv_9793 with PID 27898 started at Mon Mar 26 17:43:14 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:43:15 EDT 2012 ssl.sh: #1015: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27898 at Mon Mar 26 17:43:15 EDT 2012 kill -USR1 27898 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27898 killed at Mon Mar 26 17:43:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27973 >/dev/null 2>/dev/null selfserv_9793 with PID 27973 found at Mon Mar 26 17:43:15 EDT 2012 selfserv_9793 with PID 27973 started at Mon Mar 26 17:43:15 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:43:15 EDT 2012 ssl.sh: #1016: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27973 at Mon Mar 26 17:43:15 EDT 2012 kill -USR1 27973 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27973 killed at Mon Mar 26 17:43:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28048 >/dev/null 2>/dev/null selfserv_9793 with PID 28048 found at Mon Mar 26 17:43:15 EDT 2012 selfserv_9793 with PID 28048 started at Mon Mar 26 17:43:15 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:43:15 EDT 2012 ssl.sh: #1017: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28048 at Mon Mar 26 17:43:15 EDT 2012 kill -USR1 28048 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28048 killed at Mon Mar 26 17:43:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28124 >/dev/null 2>/dev/null selfserv_9793 with PID 28124 found at Mon Mar 26 17:43:16 EDT 2012 selfserv_9793 with PID 28124 started at Mon Mar 26 17:43:16 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:16 EDT 2012 ssl.sh: #1018: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28124 at Mon Mar 26 17:43:16 EDT 2012 kill -USR1 28124 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28124 killed at Mon Mar 26 17:43:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28200 >/dev/null 2>/dev/null selfserv_9793 with PID 28200 found at Mon Mar 26 17:43:16 EDT 2012 selfserv_9793 with PID 28200 started at Mon Mar 26 17:43:16 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:16 EDT 2012 ssl.sh: #1019: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28200 at Mon Mar 26 17:43:16 EDT 2012 kill -USR1 28200 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28200 killed at Mon Mar 26 17:43:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28276 >/dev/null 2>/dev/null selfserv_9793 with PID 28276 found at Mon Mar 26 17:43:16 EDT 2012 selfserv_9793 with PID 28276 started at Mon Mar 26 17:43:16 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:43:16 EDT 2012 ssl.sh: #1020: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28276 at Mon Mar 26 17:43:16 EDT 2012 kill -USR1 28276 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28276 killed at Mon Mar 26 17:43:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28352 >/dev/null 2>/dev/null selfserv_9793 with PID 28352 found at Mon Mar 26 17:43:16 EDT 2012 selfserv_9793 with PID 28352 started at Mon Mar 26 17:43:16 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:43:17 EDT 2012 ssl.sh: #1021: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28352 at Mon Mar 26 17:43:17 EDT 2012 kill -USR1 28352 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28352 killed at Mon Mar 26 17:43:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9793 starting at Mon Mar 26 17:43:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28434 >/dev/null 2>/dev/null selfserv_9793 with PID 28434 found at Mon Mar 26 17:43:17 EDT 2012 selfserv_9793 with PID 28434 started at Mon Mar 26 17:43:17 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:17 EDT 2012 ssl.sh: #1022: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28434 at Mon Mar 26 17:43:17 EDT 2012 kill -USR1 28434 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28434 killed at Mon Mar 26 17:43:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9793 starting at Mon Mar 26 17:43:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28517 >/dev/null 2>/dev/null selfserv_9793 with PID 28517 found at Mon Mar 26 17:43:17 EDT 2012 selfserv_9793 with PID 28517 started at Mon Mar 26 17:43:17 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:18 EDT 2012 ssl.sh: #1023: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28517 at Mon Mar 26 17:43:18 EDT 2012 kill -USR1 28517 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28517 killed at Mon Mar 26 17:43:18 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass =============================== selfserv_9793 starting at Mon Mar 26 17:43:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:18 EDT 2012 selfserv_9793 with PID 28670 started at Mon Mar 26 17:43:18 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 28670 >/dev/null 2>/dev/null selfserv_9793 with PID 28670 found at Mon Mar 26 17:43:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 28670 at Mon Mar 26 17:43:21 EDT 2012 kill -USR1 28670 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28670 killed at Mon Mar 26 17:43:21 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30138 >/dev/null 2>/dev/null selfserv_9793 with PID 30138 found at Mon Mar 26 17:43:21 EDT 2012 selfserv_9793 with PID 30138 started at Mon Mar 26 17:43:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30138 at Mon Mar 26 17:43:21 EDT 2012 kill -USR1 30138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30138 killed at Mon Mar 26 17:43:21 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30195 >/dev/null 2>/dev/null selfserv_9793 with PID 30195 found at Mon Mar 26 17:43:21 EDT 2012 selfserv_9793 with PID 30195 started at Mon Mar 26 17:43:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30195 at Mon Mar 26 17:43:21 EDT 2012 kill -USR1 30195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30195 killed at Mon Mar 26 17:43:21 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30252 >/dev/null 2>/dev/null selfserv_9793 with PID 30252 found at Mon Mar 26 17:43:21 EDT 2012 selfserv_9793 with PID 30252 started at Mon Mar 26 17:43:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30252 at Mon Mar 26 17:43:21 EDT 2012 kill -USR1 30252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30252 killed at Mon Mar 26 17:43:21 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30309 >/dev/null 2>/dev/null selfserv_9793 with PID 30309 found at Mon Mar 26 17:43:21 EDT 2012 selfserv_9793 with PID 30309 started at Mon Mar 26 17:43:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1055: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 30309 at Mon Mar 26 17:43:21 EDT 2012 kill -USR1 30309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30309 killed at Mon Mar 26 17:43:21 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30366 >/dev/null 2>/dev/null selfserv_9793 with PID 30366 found at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 with PID 30366 started at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1056: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 30366 at Mon Mar 26 17:43:22 EDT 2012 kill -USR1 30366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30366 killed at Mon Mar 26 17:43:22 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30423 >/dev/null 2>/dev/null selfserv_9793 with PID 30423 found at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 with PID 30423 started at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30423 at Mon Mar 26 17:43:22 EDT 2012 kill -USR1 30423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30423 killed at Mon Mar 26 17:43:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30480 >/dev/null 2>/dev/null selfserv_9793 with PID 30480 found at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 with PID 30480 started at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30480 at Mon Mar 26 17:43:22 EDT 2012 kill -USR1 30480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30480 killed at Mon Mar 26 17:43:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30537 >/dev/null 2>/dev/null selfserv_9793 with PID 30537 found at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 with PID 30537 started at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30537 at Mon Mar 26 17:43:22 EDT 2012 kill -USR1 30537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30537 killed at Mon Mar 26 17:43:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30594 >/dev/null 2>/dev/null selfserv_9793 with PID 30594 found at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 with PID 30594 started at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30594 at Mon Mar 26 17:43:22 EDT 2012 kill -USR1 30594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30594 killed at Mon Mar 26 17:43:22 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30651 >/dev/null 2>/dev/null selfserv_9793 with PID 30651 found at Mon Mar 26 17:43:22 EDT 2012 selfserv_9793 with PID 30651 started at Mon Mar 26 17:43:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1061: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 30651 at Mon Mar 26 17:43:23 EDT 2012 kill -USR1 30651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30651 killed at Mon Mar 26 17:43:23 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30708 >/dev/null 2>/dev/null selfserv_9793 with PID 30708 found at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 with PID 30708 started at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1062: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 30708 at Mon Mar 26 17:43:23 EDT 2012 kill -USR1 30708 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30708 killed at Mon Mar 26 17:43:23 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30765 >/dev/null 2>/dev/null selfserv_9793 with PID 30765 found at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 with PID 30765 started at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30765 at Mon Mar 26 17:43:23 EDT 2012 kill -USR1 30765 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30765 killed at Mon Mar 26 17:43:23 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30822 >/dev/null 2>/dev/null selfserv_9793 with PID 30822 found at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 with PID 30822 started at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30822 at Mon Mar 26 17:43:23 EDT 2012 kill -USR1 30822 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30822 killed at Mon Mar 26 17:43:23 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30879 >/dev/null 2>/dev/null selfserv_9793 with PID 30879 found at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 with PID 30879 started at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30879 at Mon Mar 26 17:43:23 EDT 2012 kill -USR1 30879 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30879 killed at Mon Mar 26 17:43:23 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30936 >/dev/null 2>/dev/null selfserv_9793 with PID 30936 found at Mon Mar 26 17:43:23 EDT 2012 selfserv_9793 with PID 30936 started at Mon Mar 26 17:43:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 30936 at Mon Mar 26 17:43:23 EDT 2012 kill -USR1 30936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30936 killed at Mon Mar 26 17:43:23 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 30993 >/dev/null 2>/dev/null selfserv_9793 with PID 30993 found at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 with PID 30993 started at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1067: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 30993 at Mon Mar 26 17:43:24 EDT 2012 kill -USR1 30993 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 30993 killed at Mon Mar 26 17:43:24 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31050 >/dev/null 2>/dev/null selfserv_9793 with PID 31050 found at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 with PID 31050 started at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1068: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 31050 at Mon Mar 26 17:43:24 EDT 2012 kill -USR1 31050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31050 killed at Mon Mar 26 17:43:24 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31107 >/dev/null 2>/dev/null selfserv_9793 with PID 31107 found at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 with PID 31107 started at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 31107 at Mon Mar 26 17:43:24 EDT 2012 kill -USR1 31107 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31107 killed at Mon Mar 26 17:43:24 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31164 >/dev/null 2>/dev/null selfserv_9793 with PID 31164 found at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 with PID 31164 started at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 31164 at Mon Mar 26 17:43:24 EDT 2012 kill -USR1 31164 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31164 killed at Mon Mar 26 17:43:24 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31221 >/dev/null 2>/dev/null selfserv_9793 with PID 31221 found at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 with PID 31221 started at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 31221 at Mon Mar 26 17:43:24 EDT 2012 kill -USR1 31221 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31221 killed at Mon Mar 26 17:43:24 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31278 >/dev/null 2>/dev/null selfserv_9793 with PID 31278 found at Mon Mar 26 17:43:24 EDT 2012 selfserv_9793 with PID 31278 started at Mon Mar 26 17:43:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 31278 at Mon Mar 26 17:43:25 EDT 2012 kill -USR1 31278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31278 killed at Mon Mar 26 17:43:25 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31335 >/dev/null 2>/dev/null selfserv_9793 with PID 31335 found at Mon Mar 26 17:43:25 EDT 2012 selfserv_9793 with PID 31335 started at Mon Mar 26 17:43:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1073: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 31335 at Mon Mar 26 17:43:25 EDT 2012 kill -USR1 31335 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31335 killed at Mon Mar 26 17:43:25 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31392 >/dev/null 2>/dev/null selfserv_9793 with PID 31392 found at Mon Mar 26 17:43:25 EDT 2012 selfserv_9793 with PID 31392 started at Mon Mar 26 17:43:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1074: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 31392 at Mon Mar 26 17:43:25 EDT 2012 kill -USR1 31392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31392 killed at Mon Mar 26 17:43:25 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31449 >/dev/null 2>/dev/null selfserv_9793 with PID 31449 found at Mon Mar 26 17:43:25 EDT 2012 selfserv_9793 with PID 31449 started at Mon Mar 26 17:43:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 31449 at Mon Mar 26 17:43:25 EDT 2012 kill -USR1 31449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31449 killed at Mon Mar 26 17:43:25 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:43:26 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31884 >/dev/null 2>/dev/null selfserv_9793 with PID 31884 found at Mon Mar 26 17:43:26 EDT 2012 selfserv_9793 with PID 31884 started at Mon Mar 26 17:43:26 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:26 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:26 EDT 2012 ssl.sh: #1076: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 31884 at Mon Mar 26 17:43:26 EDT 2012 kill -USR1 31884 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31884 killed at Mon Mar 26 17:43:26 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:43:26 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 31960 >/dev/null 2>/dev/null selfserv_9793 with PID 31960 found at Mon Mar 26 17:43:26 EDT 2012 selfserv_9793 with PID 31960 started at Mon Mar 26 17:43:26 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:26 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:27 EDT 2012 ssl.sh: #1077: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 31960 at Mon Mar 26 17:43:27 EDT 2012 kill -USR1 31960 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 31960 killed at Mon Mar 26 17:43:27 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:27 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32036 >/dev/null 2>/dev/null selfserv_9793 with PID 32036 found at Mon Mar 26 17:43:27 EDT 2012 selfserv_9793 with PID 32036 started at Mon Mar 26 17:43:27 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:27 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:27 EDT 2012 ssl.sh: #1078: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32036 at Mon Mar 26 17:43:27 EDT 2012 kill -USR1 32036 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32036 killed at Mon Mar 26 17:43:27 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:43:27 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:27 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32112 >/dev/null 2>/dev/null selfserv_9793 with PID 32112 found at Mon Mar 26 17:43:27 EDT 2012 selfserv_9793 with PID 32112 started at Mon Mar 26 17:43:27 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:28 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:28 EDT 2012 ssl.sh: #1079: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32112 at Mon Mar 26 17:43:28 EDT 2012 kill -USR1 32112 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32112 killed at Mon Mar 26 17:43:28 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:43:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32188 >/dev/null 2>/dev/null selfserv_9793 with PID 32188 found at Mon Mar 26 17:43:28 EDT 2012 selfserv_9793 with PID 32188 started at Mon Mar 26 17:43:28 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:28 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:29 EDT 2012 ssl.sh: #1080: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32188 at Mon Mar 26 17:43:29 EDT 2012 kill -USR1 32188 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32188 killed at Mon Mar 26 17:43:29 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:43:29 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32264 >/dev/null 2>/dev/null selfserv_9793 with PID 32264 found at Mon Mar 26 17:43:29 EDT 2012 selfserv_9793 with PID 32264 started at Mon Mar 26 17:43:29 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:29 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:30 EDT 2012 ssl.sh: #1081: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32264 at Mon Mar 26 17:43:30 EDT 2012 kill -USR1 32264 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32264 killed at Mon Mar 26 17:43:30 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:30 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32340 >/dev/null 2>/dev/null selfserv_9793 with PID 32340 found at Mon Mar 26 17:43:30 EDT 2012 selfserv_9793 with PID 32340 started at Mon Mar 26 17:43:30 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:30 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:31 EDT 2012 ssl.sh: #1082: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32340 at Mon Mar 26 17:43:31 EDT 2012 kill -USR1 32340 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32340 killed at Mon Mar 26 17:43:31 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32445 >/dev/null 2>/dev/null selfserv_9793 with PID 32445 found at Mon Mar 26 17:43:31 EDT 2012 selfserv_9793 with PID 32445 started at Mon Mar 26 17:43:31 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:43:31 EDT 2012 ssl.sh: #1083: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32445 at Mon Mar 26 17:43:31 EDT 2012 kill -USR1 32445 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32445 killed at Mon Mar 26 17:43:31 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32521 >/dev/null 2>/dev/null selfserv_9793 with PID 32521 found at Mon Mar 26 17:43:31 EDT 2012 selfserv_9793 with PID 32521 started at Mon Mar 26 17:43:31 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:43:32 EDT 2012 ssl.sh: #1084: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32521 at Mon Mar 26 17:43:32 EDT 2012 kill -USR1 32521 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32521 killed at Mon Mar 26 17:43:32 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:32 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32596 >/dev/null 2>/dev/null selfserv_9793 with PID 32596 found at Mon Mar 26 17:43:32 EDT 2012 selfserv_9793 with PID 32596 started at Mon Mar 26 17:43:32 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:43:32 EDT 2012 ssl.sh: #1085: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32596 at Mon Mar 26 17:43:32 EDT 2012 kill -USR1 32596 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32596 killed at Mon Mar 26 17:43:32 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:32 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32672 >/dev/null 2>/dev/null selfserv_9793 with PID 32672 found at Mon Mar 26 17:43:32 EDT 2012 selfserv_9793 with PID 32672 started at Mon Mar 26 17:43:32 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:32 EDT 2012 ssl.sh: #1086: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32672 at Mon Mar 26 17:43:32 EDT 2012 kill -USR1 32672 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32672 killed at Mon Mar 26 17:43:32 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:32 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 32748 >/dev/null 2>/dev/null selfserv_9793 with PID 32748 found at Mon Mar 26 17:43:32 EDT 2012 selfserv_9793 with PID 32748 started at Mon Mar 26 17:43:32 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:33 EDT 2012 ssl.sh: #1087: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 32748 at Mon Mar 26 17:43:33 EDT 2012 kill -USR1 32748 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 32748 killed at Mon Mar 26 17:43:33 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:33 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:33 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 361 >/dev/null 2>/dev/null selfserv_9793 with PID 361 found at Mon Mar 26 17:43:33 EDT 2012 selfserv_9793 with PID 361 started at Mon Mar 26 17:43:33 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:33 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:43:33 EDT 2012 ssl.sh: #1088: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 361 at Mon Mar 26 17:43:33 EDT 2012 kill -USR1 361 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 361 killed at Mon Mar 26 17:43:33 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:33 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:33 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 439 >/dev/null 2>/dev/null selfserv_9793 with PID 439 found at Mon Mar 26 17:43:33 EDT 2012 selfserv_9793 with PID 439 started at Mon Mar 26 17:43:33 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:33 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:43:33 EDT 2012 ssl.sh: #1089: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 439 at Mon Mar 26 17:43:33 EDT 2012 kill -USR1 439 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 439 killed at Mon Mar 26 17:43:33 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #1090: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -list ssl.sh: #1091: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1092: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1093: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -list ssl.sh: #1094: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1095: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9793 starting at Mon Mar 26 17:43:34 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:34 EDT 2012 selfserv_9793 with PID 669 started at Mon Mar 26 17:43:34 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1096: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1097: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1098: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1099: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1100: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1101: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1102: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1103: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1104: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1105: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1106: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1107: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1108: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1109: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1110: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1111: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1112: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1113: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1114: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 669 >/dev/null 2>/dev/null selfserv_9793 with PID 669 found at Mon Mar 26 17:43:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1115: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 669 at Mon Mar 26 17:43:36 EDT 2012 kill -USR1 669 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 669 killed at Mon Mar 26 17:43:36 EDT 2012 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:36 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2061 >/dev/null 2>/dev/null selfserv_9793 with PID 2061 found at Mon Mar 26 17:43:36 EDT 2012 selfserv_9793 with PID 2061 started at Mon Mar 26 17:43:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1116: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2061 at Mon Mar 26 17:43:36 EDT 2012 kill -USR1 2061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2061 killed at Mon Mar 26 17:43:36 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:36 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2118 >/dev/null 2>/dev/null selfserv_9793 with PID 2118 found at Mon Mar 26 17:43:36 EDT 2012 selfserv_9793 with PID 2118 started at Mon Mar 26 17:43:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2118 at Mon Mar 26 17:43:36 EDT 2012 kill -USR1 2118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2118 killed at Mon Mar 26 17:43:36 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:36 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2175 >/dev/null 2>/dev/null selfserv_9793 with PID 2175 found at Mon Mar 26 17:43:36 EDT 2012 selfserv_9793 with PID 2175 started at Mon Mar 26 17:43:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2175 at Mon Mar 26 17:43:37 EDT 2012 kill -USR1 2175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2175 killed at Mon Mar 26 17:43:37 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2232 >/dev/null 2>/dev/null selfserv_9793 with PID 2232 found at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 with PID 2232 started at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1119: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2232 at Mon Mar 26 17:43:37 EDT 2012 kill -USR1 2232 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2232 killed at Mon Mar 26 17:43:37 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2289 >/dev/null 2>/dev/null selfserv_9793 with PID 2289 found at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 with PID 2289 started at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1120: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2289 at Mon Mar 26 17:43:37 EDT 2012 kill -USR1 2289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2289 killed at Mon Mar 26 17:43:37 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2346 >/dev/null 2>/dev/null selfserv_9793 with PID 2346 found at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 with PID 2346 started at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2346 at Mon Mar 26 17:43:37 EDT 2012 kill -USR1 2346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2346 killed at Mon Mar 26 17:43:37 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2403 >/dev/null 2>/dev/null selfserv_9793 with PID 2403 found at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 with PID 2403 started at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2403 at Mon Mar 26 17:43:37 EDT 2012 kill -USR1 2403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2403 killed at Mon Mar 26 17:43:37 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2460 >/dev/null 2>/dev/null selfserv_9793 with PID 2460 found at Mon Mar 26 17:43:37 EDT 2012 selfserv_9793 with PID 2460 started at Mon Mar 26 17:43:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2460 at Mon Mar 26 17:43:37 EDT 2012 kill -USR1 2460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2460 killed at Mon Mar 26 17:43:37 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:38 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:38 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2517 >/dev/null 2>/dev/null selfserv_9793 with PID 2517 found at Mon Mar 26 17:43:38 EDT 2012 selfserv_9793 with PID 2517 started at Mon Mar 26 17:43:38 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2517 at Mon Mar 26 17:43:38 EDT 2012 kill -USR1 2517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2517 killed at Mon Mar 26 17:43:38 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:38 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:38 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2574 >/dev/null 2>/dev/null selfserv_9793 with PID 2574 found at Mon Mar 26 17:43:41 EDT 2012 selfserv_9793 with PID 2574 started at Mon Mar 26 17:43:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1125: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2574 at Mon Mar 26 17:43:41 EDT 2012 kill -USR1 2574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2574 killed at Mon Mar 26 17:43:41 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:41 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2631 >/dev/null 2>/dev/null selfserv_9793 with PID 2631 found at Mon Mar 26 17:43:41 EDT 2012 selfserv_9793 with PID 2631 started at Mon Mar 26 17:43:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1126: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2631 at Mon Mar 26 17:43:41 EDT 2012 kill -USR1 2631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2631 killed at Mon Mar 26 17:43:41 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:41 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2688 >/dev/null 2>/dev/null selfserv_9793 with PID 2688 found at Mon Mar 26 17:43:41 EDT 2012 selfserv_9793 with PID 2688 started at Mon Mar 26 17:43:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2688 at Mon Mar 26 17:43:41 EDT 2012 kill -USR1 2688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2688 killed at Mon Mar 26 17:43:41 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:41 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2745 >/dev/null 2>/dev/null selfserv_9793 with PID 2745 found at Mon Mar 26 17:43:41 EDT 2012 selfserv_9793 with PID 2745 started at Mon Mar 26 17:43:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2745 at Mon Mar 26 17:43:41 EDT 2012 kill -USR1 2745 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2745 killed at Mon Mar 26 17:43:41 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:41 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2802 >/dev/null 2>/dev/null selfserv_9793 with PID 2802 found at Mon Mar 26 17:43:41 EDT 2012 selfserv_9793 with PID 2802 started at Mon Mar 26 17:43:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2802 at Mon Mar 26 17:43:42 EDT 2012 kill -USR1 2802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2802 killed at Mon Mar 26 17:43:42 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:42 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:42 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2859 >/dev/null 2>/dev/null selfserv_9793 with PID 2859 found at Mon Mar 26 17:43:45 EDT 2012 selfserv_9793 with PID 2859 started at Mon Mar 26 17:43:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2859 at Mon Mar 26 17:43:45 EDT 2012 kill -USR1 2859 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2859 killed at Mon Mar 26 17:43:45 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:45 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2916 >/dev/null 2>/dev/null selfserv_9793 with PID 2916 found at Mon Mar 26 17:43:45 EDT 2012 selfserv_9793 with PID 2916 started at Mon Mar 26 17:43:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1131: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2916 at Mon Mar 26 17:43:45 EDT 2012 kill -USR1 2916 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2916 killed at Mon Mar 26 17:43:45 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:45 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2973 >/dev/null 2>/dev/null selfserv_9793 with PID 2973 found at Mon Mar 26 17:43:45 EDT 2012 selfserv_9793 with PID 2973 started at Mon Mar 26 17:43:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1132: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 2973 at Mon Mar 26 17:43:45 EDT 2012 kill -USR1 2973 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2973 killed at Mon Mar 26 17:43:45 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:45 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3030 >/dev/null 2>/dev/null selfserv_9793 with PID 3030 found at Mon Mar 26 17:43:45 EDT 2012 selfserv_9793 with PID 3030 started at Mon Mar 26 17:43:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3030 at Mon Mar 26 17:43:45 EDT 2012 kill -USR1 3030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3030 killed at Mon Mar 26 17:43:45 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:45 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3087 >/dev/null 2>/dev/null selfserv_9793 with PID 3087 found at Mon Mar 26 17:43:45 EDT 2012 selfserv_9793 with PID 3087 started at Mon Mar 26 17:43:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3087 at Mon Mar 26 17:43:46 EDT 2012 kill -USR1 3087 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3087 killed at Mon Mar 26 17:43:46 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3144 >/dev/null 2>/dev/null selfserv_9793 with PID 3144 found at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 with PID 3144 started at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3144 at Mon Mar 26 17:43:46 EDT 2012 kill -USR1 3144 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3144 killed at Mon Mar 26 17:43:46 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3201 >/dev/null 2>/dev/null selfserv_9793 with PID 3201 found at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 with PID 3201 started at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3201 at Mon Mar 26 17:43:46 EDT 2012 kill -USR1 3201 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3201 killed at Mon Mar 26 17:43:46 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3258 >/dev/null 2>/dev/null selfserv_9793 with PID 3258 found at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 with PID 3258 started at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1137: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3258 at Mon Mar 26 17:43:46 EDT 2012 kill -USR1 3258 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3258 killed at Mon Mar 26 17:43:46 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3315 >/dev/null 2>/dev/null selfserv_9793 with PID 3315 found at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 with PID 3315 started at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1138: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3315 at Mon Mar 26 17:43:46 EDT 2012 kill -USR1 3315 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3315 killed at Mon Mar 26 17:43:46 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3372 >/dev/null 2>/dev/null selfserv_9793 with PID 3372 found at Mon Mar 26 17:43:46 EDT 2012 selfserv_9793 with PID 3372 started at Mon Mar 26 17:43:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3372 at Mon Mar 26 17:43:47 EDT 2012 kill -USR1 3372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3372 killed at Mon Mar 26 17:43:47 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3497 >/dev/null 2>/dev/null selfserv_9793 with PID 3497 found at Mon Mar 26 17:43:47 EDT 2012 selfserv_9793 with PID 3497 started at Mon Mar 26 17:43:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3497 at Mon Mar 26 17:43:47 EDT 2012 kill -USR1 3497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3497 killed at Mon Mar 26 17:43:47 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3560 >/dev/null 2>/dev/null selfserv_9793 with PID 3560 found at Mon Mar 26 17:43:47 EDT 2012 selfserv_9793 with PID 3560 started at Mon Mar 26 17:43:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3560 at Mon Mar 26 17:43:47 EDT 2012 kill -USR1 3560 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3560 killed at Mon Mar 26 17:43:47 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:43:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3623 >/dev/null 2>/dev/null selfserv_9793 with PID 3623 found at Mon Mar 26 17:43:47 EDT 2012 selfserv_9793 with PID 3623 started at Mon Mar 26 17:43:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1142: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3623 at Mon Mar 26 17:43:47 EDT 2012 kill -USR1 3623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3623 killed at Mon Mar 26 17:43:47 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:47 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3686 >/dev/null 2>/dev/null selfserv_9793 with PID 3686 found at Mon Mar 26 17:43:47 EDT 2012 selfserv_9793 with PID 3686 started at Mon Mar 26 17:43:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3686 at Mon Mar 26 17:43:47 EDT 2012 kill -USR1 3686 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3686 killed at Mon Mar 26 17:43:47 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9793 starting at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3749 >/dev/null 2>/dev/null selfserv_9793 with PID 3749 found at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 with PID 3749 started at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #1144: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3749 at Mon Mar 26 17:43:48 EDT 2012 kill -USR1 3749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3749 killed at Mon Mar 26 17:43:48 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3812 >/dev/null 2>/dev/null selfserv_9793 with PID 3812 found at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 with PID 3812 started at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3812 at Mon Mar 26 17:43:48 EDT 2012 kill -USR1 3812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3812 killed at Mon Mar 26 17:43:48 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3875 >/dev/null 2>/dev/null selfserv_9793 with PID 3875 found at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 with PID 3875 started at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3875 at Mon Mar 26 17:43:48 EDT 2012 kill -USR1 3875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3875 killed at Mon Mar 26 17:43:48 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3938 >/dev/null 2>/dev/null selfserv_9793 with PID 3938 found at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 with PID 3938 started at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1147: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 3938 at Mon Mar 26 17:43:48 EDT 2012 kill -USR1 3938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3938 killed at Mon Mar 26 17:43:48 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4001 >/dev/null 2>/dev/null selfserv_9793 with PID 4001 found at Mon Mar 26 17:43:48 EDT 2012 selfserv_9793 with PID 4001 started at Mon Mar 26 17:43:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1148: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4001 at Mon Mar 26 17:43:49 EDT 2012 kill -USR1 4001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4001 killed at Mon Mar 26 17:43:49 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:43:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4064 >/dev/null 2>/dev/null selfserv_9793 with PID 4064 found at Mon Mar 26 17:43:49 EDT 2012 selfserv_9793 with PID 4064 started at Mon Mar 26 17:43:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1149: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4064 at Mon Mar 26 17:43:49 EDT 2012 kill -USR1 4064 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4064 killed at Mon Mar 26 17:43:49 EDT 2012 ssl.sh: SSL Stress Test - server fips/client normal =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:43:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4417 >/dev/null 2>/dev/null selfserv_9793 with PID 4417 found at Mon Mar 26 17:43:49 EDT 2012 selfserv_9793 with PID 4417 started at Mon Mar 26 17:43:49 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:49 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:50 EDT 2012 ssl.sh: #1150: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 4417 at Mon Mar 26 17:43:50 EDT 2012 kill -USR1 4417 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4417 killed at Mon Mar 26 17:43:50 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:43:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4493 >/dev/null 2>/dev/null selfserv_9793 with PID 4493 found at Mon Mar 26 17:43:50 EDT 2012 selfserv_9793 with PID 4493 started at Mon Mar 26 17:43:50 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:50 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:50 EDT 2012 ssl.sh: #1151: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 4493 at Mon Mar 26 17:43:50 EDT 2012 kill -USR1 4493 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4493 killed at Mon Mar 26 17:43:50 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4569 >/dev/null 2>/dev/null selfserv_9793 with PID 4569 found at Mon Mar 26 17:43:51 EDT 2012 selfserv_9793 with PID 4569 started at Mon Mar 26 17:43:51 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:51 EDT 2012 ssl.sh: #1152: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 4569 at Mon Mar 26 17:43:51 EDT 2012 kill -USR1 4569 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4569 killed at Mon Mar 26 17:43:51 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:43:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4645 >/dev/null 2>/dev/null selfserv_9793 with PID 4645 found at Mon Mar 26 17:43:51 EDT 2012 selfserv_9793 with PID 4645 started at Mon Mar 26 17:43:51 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:52 EDT 2012 ssl.sh: #1153: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 4645 at Mon Mar 26 17:43:52 EDT 2012 kill -USR1 4645 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4645 killed at Mon Mar 26 17:43:52 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:43:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4721 >/dev/null 2>/dev/null selfserv_9793 with PID 4721 found at Mon Mar 26 17:43:52 EDT 2012 selfserv_9793 with PID 4721 started at Mon Mar 26 17:43:52 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:52 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:53 EDT 2012 ssl.sh: #1154: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 4721 at Mon Mar 26 17:43:53 EDT 2012 kill -USR1 4721 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4721 killed at Mon Mar 26 17:43:53 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:43:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4797 >/dev/null 2>/dev/null selfserv_9793 with PID 4797 found at Mon Mar 26 17:43:53 EDT 2012 selfserv_9793 with PID 4797 started at Mon Mar 26 17:43:53 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:54 EDT 2012 ssl.sh: #1155: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 4797 at Mon Mar 26 17:43:54 EDT 2012 kill -USR1 4797 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4797 killed at Mon Mar 26 17:43:54 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4873 >/dev/null 2>/dev/null selfserv_9793 with PID 4873 found at Mon Mar 26 17:43:54 EDT 2012 selfserv_9793 with PID 4873 started at Mon Mar 26 17:43:54 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:55 EDT 2012 ssl.sh: #1156: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 4873 at Mon Mar 26 17:43:55 EDT 2012 kill -USR1 4873 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4873 killed at Mon Mar 26 17:43:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9793 starting at Mon Mar 26 17:43:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4955 >/dev/null 2>/dev/null selfserv_9793 with PID 4955 found at Mon Mar 26 17:43:55 EDT 2012 selfserv_9793 with PID 4955 started at Mon Mar 26 17:43:55 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:56 EDT 2012 ssl.sh: #1157: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 4955 at Mon Mar 26 17:43:56 EDT 2012 kill -USR1 4955 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4955 killed at Mon Mar 26 17:43:56 EDT 2012 ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5056 >/dev/null 2>/dev/null selfserv_9793 with PID 5056 found at Mon Mar 26 17:43:56 EDT 2012 selfserv_9793 with PID 5056 started at Mon Mar 26 17:43:56 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:43:56 EDT 2012 ssl.sh: #1158: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 5056 at Mon Mar 26 17:43:56 EDT 2012 kill -USR1 5056 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5056 killed at Mon Mar 26 17:43:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5131 >/dev/null 2>/dev/null selfserv_9793 with PID 5131 found at Mon Mar 26 17:43:56 EDT 2012 selfserv_9793 with PID 5131 started at Mon Mar 26 17:43:56 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:43:57 EDT 2012 ssl.sh: #1159: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 5131 at Mon Mar 26 17:43:57 EDT 2012 kill -USR1 5131 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5131 killed at Mon Mar 26 17:43:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5206 >/dev/null 2>/dev/null selfserv_9793 with PID 5206 found at Mon Mar 26 17:43:57 EDT 2012 selfserv_9793 with PID 5206 started at Mon Mar 26 17:43:57 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:43:57 EDT 2012 ssl.sh: #1160: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 5206 at Mon Mar 26 17:43:57 EDT 2012 kill -USR1 5206 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5206 killed at Mon Mar 26 17:43:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5282 >/dev/null 2>/dev/null selfserv_9793 with PID 5282 found at Mon Mar 26 17:43:57 EDT 2012 selfserv_9793 with PID 5282 started at Mon Mar 26 17:43:57 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:58 EDT 2012 ssl.sh: #1161: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 5282 at Mon Mar 26 17:43:58 EDT 2012 kill -USR1 5282 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5282 killed at Mon Mar 26 17:43:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5358 >/dev/null 2>/dev/null selfserv_9793 with PID 5358 found at Mon Mar 26 17:43:58 EDT 2012 selfserv_9793 with PID 5358 started at Mon Mar 26 17:43:58 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:43:58 EDT 2012 ssl.sh: #1162: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 5358 at Mon Mar 26 17:43:58 EDT 2012 kill -USR1 5358 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5358 killed at Mon Mar 26 17:43:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:43:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5434 >/dev/null 2>/dev/null selfserv_9793 with PID 5434 found at Mon Mar 26 17:43:58 EDT 2012 selfserv_9793 with PID 5434 started at Mon Mar 26 17:43:58 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:43:58 EDT 2012 ssl.sh: #1163: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 5434 at Mon Mar 26 17:43:58 EDT 2012 kill -USR1 5434 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5434 killed at Mon Mar 26 17:43:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:43:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5510 >/dev/null 2>/dev/null selfserv_9793 with PID 5510 found at Mon Mar 26 17:43:58 EDT 2012 selfserv_9793 with PID 5510 started at Mon Mar 26 17:43:58 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:43:58 EDT 2012 ssl.sh: #1164: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 5510 at Mon Mar 26 17:43:58 EDT 2012 kill -USR1 5510 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5510 killed at Mon Mar 26 17:43:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9793 starting at Mon Mar 26 17:43:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5592 >/dev/null 2>/dev/null selfserv_9793 with PID 5592 found at Mon Mar 26 17:43:59 EDT 2012 selfserv_9793 with PID 5592 started at Mon Mar 26 17:43:59 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:59 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:43:59 EDT 2012 ssl.sh: #1165: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 5592 at Mon Mar 26 17:43:59 EDT 2012 kill -USR1 5592 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5592 killed at Mon Mar 26 17:43:59 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9793 starting at Mon Mar 26 17:43:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:43:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5674 >/dev/null 2>/dev/null selfserv_9793 with PID 5674 found at Mon Mar 26 17:43:59 EDT 2012 selfserv_9793 with PID 5674 started at Mon Mar 26 17:43:59 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:43:59 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:44:00 EDT 2012 ssl.sh: #1166: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 5674 at Mon Mar 26 17:44:00 EDT 2012 kill -USR1 5674 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5674 killed at Mon Mar 26 17:44:00 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9793 starting at Mon Mar 26 17:44:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:00 EDT 2012 selfserv_9793 with PID 5827 started at Mon Mar 26 17:44:00 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 5827 >/dev/null 2>/dev/null selfserv_9793 with PID 5827 found at Mon Mar 26 17:44:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 5827 at Mon Mar 26 17:44:02 EDT 2012 kill -USR1 5827 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5827 killed at Mon Mar 26 17:44:02 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7149 >/dev/null 2>/dev/null selfserv_9793 with PID 7149 found at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 with PID 7149 started at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7149 at Mon Mar 26 17:44:03 EDT 2012 kill -USR1 7149 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7149 killed at Mon Mar 26 17:44:03 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7206 >/dev/null 2>/dev/null selfserv_9793 with PID 7206 found at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 with PID 7206 started at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7206 at Mon Mar 26 17:44:03 EDT 2012 kill -USR1 7206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7206 killed at Mon Mar 26 17:44:03 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7263 >/dev/null 2>/dev/null selfserv_9793 with PID 7263 found at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 with PID 7263 started at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7263 at Mon Mar 26 17:44:03 EDT 2012 kill -USR1 7263 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7263 killed at Mon Mar 26 17:44:03 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7320 >/dev/null 2>/dev/null selfserv_9793 with PID 7320 found at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 with PID 7320 started at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1190: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7320 at Mon Mar 26 17:44:03 EDT 2012 kill -USR1 7320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7320 killed at Mon Mar 26 17:44:03 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7377 >/dev/null 2>/dev/null selfserv_9793 with PID 7377 found at Mon Mar 26 17:44:03 EDT 2012 selfserv_9793 with PID 7377 started at Mon Mar 26 17:44:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1191: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7377 at Mon Mar 26 17:44:03 EDT 2012 kill -USR1 7377 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7377 killed at Mon Mar 26 17:44:03 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7434 >/dev/null 2>/dev/null selfserv_9793 with PID 7434 found at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 with PID 7434 started at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7434 at Mon Mar 26 17:44:04 EDT 2012 kill -USR1 7434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7434 killed at Mon Mar 26 17:44:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7491 >/dev/null 2>/dev/null selfserv_9793 with PID 7491 found at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 with PID 7491 started at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7491 at Mon Mar 26 17:44:04 EDT 2012 kill -USR1 7491 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7491 killed at Mon Mar 26 17:44:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7548 >/dev/null 2>/dev/null selfserv_9793 with PID 7548 found at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 with PID 7548 started at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7548 at Mon Mar 26 17:44:04 EDT 2012 kill -USR1 7548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7548 killed at Mon Mar 26 17:44:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7605 >/dev/null 2>/dev/null selfserv_9793 with PID 7605 found at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 with PID 7605 started at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7605 at Mon Mar 26 17:44:04 EDT 2012 kill -USR1 7605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7605 killed at Mon Mar 26 17:44:04 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7662 >/dev/null 2>/dev/null selfserv_9793 with PID 7662 found at Mon Mar 26 17:44:04 EDT 2012 selfserv_9793 with PID 7662 started at Mon Mar 26 17:44:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1196: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7662 at Mon Mar 26 17:44:04 EDT 2012 kill -USR1 7662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7662 killed at Mon Mar 26 17:44:04 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7719 >/dev/null 2>/dev/null selfserv_9793 with PID 7719 found at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 with PID 7719 started at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1197: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7719 at Mon Mar 26 17:44:05 EDT 2012 kill -USR1 7719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7719 killed at Mon Mar 26 17:44:05 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7776 >/dev/null 2>/dev/null selfserv_9793 with PID 7776 found at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 with PID 7776 started at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7776 at Mon Mar 26 17:44:05 EDT 2012 kill -USR1 7776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7776 killed at Mon Mar 26 17:44:05 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7833 >/dev/null 2>/dev/null selfserv_9793 with PID 7833 found at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 with PID 7833 started at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7833 at Mon Mar 26 17:44:05 EDT 2012 kill -USR1 7833 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7833 killed at Mon Mar 26 17:44:05 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7890 >/dev/null 2>/dev/null selfserv_9793 with PID 7890 found at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 with PID 7890 started at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7890 at Mon Mar 26 17:44:05 EDT 2012 kill -USR1 7890 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7890 killed at Mon Mar 26 17:44:05 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7947 >/dev/null 2>/dev/null selfserv_9793 with PID 7947 found at Mon Mar 26 17:44:05 EDT 2012 selfserv_9793 with PID 7947 started at Mon Mar 26 17:44:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7947 at Mon Mar 26 17:44:05 EDT 2012 kill -USR1 7947 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7947 killed at Mon Mar 26 17:44:05 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8004 >/dev/null 2>/dev/null selfserv_9793 with PID 8004 found at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 with PID 8004 started at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1202: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8004 at Mon Mar 26 17:44:06 EDT 2012 kill -USR1 8004 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8004 killed at Mon Mar 26 17:44:06 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8061 >/dev/null 2>/dev/null selfserv_9793 with PID 8061 found at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 with PID 8061 started at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1203: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8061 at Mon Mar 26 17:44:06 EDT 2012 kill -USR1 8061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8061 killed at Mon Mar 26 17:44:06 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8125 >/dev/null 2>/dev/null selfserv_9793 with PID 8125 found at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 with PID 8125 started at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8125 at Mon Mar 26 17:44:06 EDT 2012 kill -USR1 8125 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8125 killed at Mon Mar 26 17:44:06 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8183 >/dev/null 2>/dev/null selfserv_9793 with PID 8183 found at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 with PID 8183 started at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8183 at Mon Mar 26 17:44:06 EDT 2012 kill -USR1 8183 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8183 killed at Mon Mar 26 17:44:06 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8240 >/dev/null 2>/dev/null selfserv_9793 with PID 8240 found at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 with PID 8240 started at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8240 at Mon Mar 26 17:44:06 EDT 2012 kill -USR1 8240 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8240 killed at Mon Mar 26 17:44:06 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8297 >/dev/null 2>/dev/null selfserv_9793 with PID 8297 found at Mon Mar 26 17:44:07 EDT 2012 selfserv_9793 with PID 8297 started at Mon Mar 26 17:44:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8297 at Mon Mar 26 17:44:07 EDT 2012 kill -USR1 8297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8297 killed at Mon Mar 26 17:44:07 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8354 >/dev/null 2>/dev/null selfserv_9793 with PID 8354 found at Mon Mar 26 17:44:07 EDT 2012 selfserv_9793 with PID 8354 started at Mon Mar 26 17:44:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1208: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8354 at Mon Mar 26 17:44:07 EDT 2012 kill -USR1 8354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8354 killed at Mon Mar 26 17:44:07 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8411 >/dev/null 2>/dev/null selfserv_9793 with PID 8411 found at Mon Mar 26 17:44:07 EDT 2012 selfserv_9793 with PID 8411 started at Mon Mar 26 17:44:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1209: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8411 at Mon Mar 26 17:44:07 EDT 2012 kill -USR1 8411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8411 killed at Mon Mar 26 17:44:07 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8468 >/dev/null 2>/dev/null selfserv_9793 with PID 8468 found at Mon Mar 26 17:44:07 EDT 2012 selfserv_9793 with PID 8468 started at Mon Mar 26 17:44:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8468 at Mon Mar 26 17:44:07 EDT 2012 kill -USR1 8468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8468 killed at Mon Mar 26 17:44:07 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server fips/client normal =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:44:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8906 >/dev/null 2>/dev/null selfserv_9793 with PID 8906 found at Mon Mar 26 17:44:08 EDT 2012 selfserv_9793 with PID 8906 started at Mon Mar 26 17:44:08 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:08 EDT 2012 ssl.sh: #1211: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 8906 at Mon Mar 26 17:44:08 EDT 2012 kill -USR1 8906 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8906 killed at Mon Mar 26 17:44:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:44:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8982 >/dev/null 2>/dev/null selfserv_9793 with PID 8982 found at Mon Mar 26 17:44:09 EDT 2012 selfserv_9793 with PID 8982 started at Mon Mar 26 17:44:09 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:09 EDT 2012 ssl.sh: #1212: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 8982 at Mon Mar 26 17:44:09 EDT 2012 kill -USR1 8982 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8982 killed at Mon Mar 26 17:44:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:44:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9058 >/dev/null 2>/dev/null selfserv_9793 with PID 9058 found at Mon Mar 26 17:44:09 EDT 2012 selfserv_9793 with PID 9058 started at Mon Mar 26 17:44:09 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:10 EDT 2012 ssl.sh: #1213: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9058 at Mon Mar 26 17:44:10 EDT 2012 kill -USR1 9058 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9058 killed at Mon Mar 26 17:44:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:44:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9134 >/dev/null 2>/dev/null selfserv_9793 with PID 9134 found at Mon Mar 26 17:44:10 EDT 2012 selfserv_9793 with PID 9134 started at Mon Mar 26 17:44:10 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:44:11 EDT 2012 ssl.sh: #1214: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9134 at Mon Mar 26 17:44:11 EDT 2012 kill -USR1 9134 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9134 killed at Mon Mar 26 17:44:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:44:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9210 >/dev/null 2>/dev/null selfserv_9793 with PID 9210 found at Mon Mar 26 17:44:11 EDT 2012 selfserv_9793 with PID 9210 started at Mon Mar 26 17:44:11 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:12 EDT 2012 ssl.sh: #1215: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9210 at Mon Mar 26 17:44:12 EDT 2012 kill -USR1 9210 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9210 killed at Mon Mar 26 17:44:12 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:44:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9286 >/dev/null 2>/dev/null selfserv_9793 with PID 9286 found at Mon Mar 26 17:44:12 EDT 2012 selfserv_9793 with PID 9286 started at Mon Mar 26 17:44:12 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:44:13 EDT 2012 ssl.sh: #1216: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9286 at Mon Mar 26 17:44:13 EDT 2012 kill -USR1 9286 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9286 killed at Mon Mar 26 17:44:13 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:44:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9362 >/dev/null 2>/dev/null selfserv_9793 with PID 9362 found at Mon Mar 26 17:44:13 EDT 2012 selfserv_9793 with PID 9362 started at Mon Mar 26 17:44:13 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:44:14 EDT 2012 ssl.sh: #1217: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9362 at Mon Mar 26 17:44:14 EDT 2012 kill -USR1 9362 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9362 killed at Mon Mar 26 17:44:14 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9467 >/dev/null 2>/dev/null selfserv_9793 with PID 9467 found at Mon Mar 26 17:44:14 EDT 2012 selfserv_9793 with PID 9467 started at Mon Mar 26 17:44:14 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:44:14 EDT 2012 ssl.sh: #1218: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9467 at Mon Mar 26 17:44:14 EDT 2012 kill -USR1 9467 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9467 killed at Mon Mar 26 17:44:14 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9542 >/dev/null 2>/dev/null selfserv_9793 with PID 9542 found at Mon Mar 26 17:44:14 EDT 2012 selfserv_9793 with PID 9542 started at Mon Mar 26 17:44:14 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:44:15 EDT 2012 ssl.sh: #1219: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9542 at Mon Mar 26 17:44:15 EDT 2012 kill -USR1 9542 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9542 killed at Mon Mar 26 17:44:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9617 >/dev/null 2>/dev/null selfserv_9793 with PID 9617 found at Mon Mar 26 17:44:15 EDT 2012 selfserv_9793 with PID 9617 started at Mon Mar 26 17:44:15 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:44:15 EDT 2012 ssl.sh: #1220: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9617 at Mon Mar 26 17:44:15 EDT 2012 kill -USR1 9617 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9617 killed at Mon Mar 26 17:44:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9693 >/dev/null 2>/dev/null selfserv_9793 with PID 9693 found at Mon Mar 26 17:44:15 EDT 2012 selfserv_9793 with PID 9693 started at Mon Mar 26 17:44:15 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:16 EDT 2012 ssl.sh: #1221: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9693 at Mon Mar 26 17:44:16 EDT 2012 kill -USR1 9693 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9693 killed at Mon Mar 26 17:44:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:44:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9769 >/dev/null 2>/dev/null selfserv_9793 with PID 9769 found at Mon Mar 26 17:44:16 EDT 2012 selfserv_9793 with PID 9769 started at Mon Mar 26 17:44:16 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:16 EDT 2012 ssl.sh: #1222: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9769 at Mon Mar 26 17:44:16 EDT 2012 kill -USR1 9769 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9769 killed at Mon Mar 26 17:44:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9845 >/dev/null 2>/dev/null selfserv_9793 with PID 9845 found at Mon Mar 26 17:44:16 EDT 2012 selfserv_9793 with PID 9845 started at Mon Mar 26 17:44:16 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:44:16 EDT 2012 ssl.sh: #1223: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9845 at Mon Mar 26 17:44:16 EDT 2012 kill -USR1 9845 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9845 killed at Mon Mar 26 17:44:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:44:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9923 >/dev/null 2>/dev/null selfserv_9793 with PID 9923 found at Mon Mar 26 17:44:16 EDT 2012 selfserv_9793 with PID 9923 started at Mon Mar 26 17:44:16 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:44:16 EDT 2012 ssl.sh: #1224: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 9923 at Mon Mar 26 17:44:16 EDT 2012 kill -USR1 9923 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9923 killed at Mon Mar 26 17:44:17 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #1225: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -list ssl.sh: #1226: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1227: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1228: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -list ssl.sh: #1229: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1230: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1231: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -list ssl.sh: #1232: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1233: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9793 starting at Mon Mar 26 17:44:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:17 EDT 2012 selfserv_9793 with PID 10205 started at Mon Mar 26 17:44:17 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1250: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1251: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1252: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 10205 >/dev/null 2>/dev/null selfserv_9793 with PID 10205 found at Mon Mar 26 17:44:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1253: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 10205 at Mon Mar 26 17:44:19 EDT 2012 kill -USR1 10205 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 10205 killed at Mon Mar 26 17:44:19 EDT 2012 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11527 >/dev/null 2>/dev/null selfserv_9793 with PID 11527 found at Mon Mar 26 17:44:19 EDT 2012 selfserv_9793 with PID 11527 started at Mon Mar 26 17:44:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1254: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 11527 at Mon Mar 26 17:44:19 EDT 2012 kill -USR1 11527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11527 killed at Mon Mar 26 17:44:19 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11584 >/dev/null 2>/dev/null selfserv_9793 with PID 11584 found at Mon Mar 26 17:44:19 EDT 2012 selfserv_9793 with PID 11584 started at Mon Mar 26 17:44:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1255: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 11584 at Mon Mar 26 17:44:20 EDT 2012 kill -USR1 11584 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11584 killed at Mon Mar 26 17:44:20 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11641 >/dev/null 2>/dev/null selfserv_9793 with PID 11641 found at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 with PID 11641 started at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1256: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 11641 at Mon Mar 26 17:44:20 EDT 2012 kill -USR1 11641 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11641 killed at Mon Mar 26 17:44:20 EDT 2012 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11704 >/dev/null 2>/dev/null selfserv_9793 with PID 11704 found at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 with PID 11704 started at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1257: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 11704 at Mon Mar 26 17:44:20 EDT 2012 kill -USR1 11704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11704 killed at Mon Mar 26 17:44:20 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11762 >/dev/null 2>/dev/null selfserv_9793 with PID 11762 found at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 with PID 11762 started at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1258: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 11762 at Mon Mar 26 17:44:20 EDT 2012 kill -USR1 11762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11762 killed at Mon Mar 26 17:44:20 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11819 >/dev/null 2>/dev/null selfserv_9793 with PID 11819 found at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 with PID 11819 started at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1259: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 11819 at Mon Mar 26 17:44:20 EDT 2012 kill -USR1 11819 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11819 killed at Mon Mar 26 17:44:20 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11882 >/dev/null 2>/dev/null selfserv_9793 with PID 11882 found at Mon Mar 26 17:44:20 EDT 2012 selfserv_9793 with PID 11882 started at Mon Mar 26 17:44:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1260: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 11882 at Mon Mar 26 17:44:21 EDT 2012 kill -USR1 11882 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11882 killed at Mon Mar 26 17:44:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11939 >/dev/null 2>/dev/null selfserv_9793 with PID 11939 found at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 with PID 11939 started at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1261: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 11939 at Mon Mar 26 17:44:21 EDT 2012 kill -USR1 11939 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11939 killed at Mon Mar 26 17:44:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11996 >/dev/null 2>/dev/null selfserv_9793 with PID 11996 found at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 with PID 11996 started at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1262: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 11996 at Mon Mar 26 17:44:21 EDT 2012 kill -USR1 11996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11996 killed at Mon Mar 26 17:44:21 EDT 2012 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12059 >/dev/null 2>/dev/null selfserv_9793 with PID 12059 found at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 with PID 12059 started at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1263: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 12059 at Mon Mar 26 17:44:21 EDT 2012 kill -USR1 12059 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12059 killed at Mon Mar 26 17:44:21 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12116 >/dev/null 2>/dev/null selfserv_9793 with PID 12116 found at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 with PID 12116 started at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1264: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 12116 at Mon Mar 26 17:44:21 EDT 2012 kill -USR1 12116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12116 killed at Mon Mar 26 17:44:21 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12173 >/dev/null 2>/dev/null selfserv_9793 with PID 12173 found at Mon Mar 26 17:44:21 EDT 2012 selfserv_9793 with PID 12173 started at Mon Mar 26 17:44:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1265: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12173 at Mon Mar 26 17:44:21 EDT 2012 kill -USR1 12173 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12173 killed at Mon Mar 26 17:44:21 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:44:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12298 >/dev/null 2>/dev/null selfserv_9793 with PID 12298 found at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 with PID 12298 started at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1266: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12298 at Mon Mar 26 17:44:25 EDT 2012 kill -USR1 12298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12298 killed at Mon Mar 26 17:44:25 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12361 >/dev/null 2>/dev/null selfserv_9793 with PID 12361 found at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 with PID 12361 started at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1267: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12361 at Mon Mar 26 17:44:25 EDT 2012 kill -USR1 12361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12361 killed at Mon Mar 26 17:44:25 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12424 >/dev/null 2>/dev/null selfserv_9793 with PID 12424 found at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 with PID 12424 started at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1268: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 12424 at Mon Mar 26 17:44:25 EDT 2012 kill -USR1 12424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12424 killed at Mon Mar 26 17:44:25 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12487 >/dev/null 2>/dev/null selfserv_9793 with PID 12487 found at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 with PID 12487 started at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1269: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12487 at Mon Mar 26 17:44:25 EDT 2012 kill -USR1 12487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12487 killed at Mon Mar 26 17:44:25 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9793 starting at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12550 >/dev/null 2>/dev/null selfserv_9793 with PID 12550 found at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 with PID 12550 started at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #1270: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 12550 at Mon Mar 26 17:44:25 EDT 2012 kill -USR1 12550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12550 killed at Mon Mar 26 17:44:25 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12613 >/dev/null 2>/dev/null selfserv_9793 with PID 12613 found at Mon Mar 26 17:44:25 EDT 2012 selfserv_9793 with PID 12613 started at Mon Mar 26 17:44:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1271: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12613 at Mon Mar 26 17:44:26 EDT 2012 kill -USR1 12613 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12613 killed at Mon Mar 26 17:44:26 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:44:26 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12676 >/dev/null 2>/dev/null selfserv_9793 with PID 12676 found at Mon Mar 26 17:44:26 EDT 2012 selfserv_9793 with PID 12676 started at Mon Mar 26 17:44:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1272: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12676 at Mon Mar 26 17:44:26 EDT 2012 kill -USR1 12676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12676 killed at Mon Mar 26 17:44:26 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:44:26 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:26 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12739 >/dev/null 2>/dev/null selfserv_9793 with PID 12739 found at Mon Mar 26 17:44:29 EDT 2012 selfserv_9793 with PID 12739 started at Mon Mar 26 17:44:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1273: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 12739 at Mon Mar 26 17:44:29 EDT 2012 kill -USR1 12739 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12739 killed at Mon Mar 26 17:44:29 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:44:29 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12802 >/dev/null 2>/dev/null selfserv_9793 with PID 12802 found at Mon Mar 26 17:44:29 EDT 2012 selfserv_9793 with PID 12802 started at Mon Mar 26 17:44:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1274: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 12802 at Mon Mar 26 17:44:29 EDT 2012 kill -USR1 12802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12802 killed at Mon Mar 26 17:44:29 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:44:29 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12865 >/dev/null 2>/dev/null selfserv_9793 with PID 12865 found at Mon Mar 26 17:44:29 EDT 2012 selfserv_9793 with PID 12865 started at Mon Mar 26 17:44:29 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1275: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 12865 at Mon Mar 26 17:44:29 EDT 2012 kill -USR1 12865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12865 killed at Mon Mar 26 17:44:29 EDT 2012 ssl.sh: SSL Stress Test - server normal/client fips =============================== ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping 2.0/LGPL 2.1 (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping this file are subject to the Mozilla Public License Version (non-FIPS only) ssl.sh: skipping you may not use this file except in compliance with (non-FIPS only) ssl.sh: skipping may obtain a copy of the License at (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the License is distributed on an "AS IS" basis, (non-FIPS only) ssl.sh: skipping ANY KIND, either express or implied. See the License (non-FIPS only) ssl.sh: skipping language governing rights and limitations under the (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping is the Netscape security libraries. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of the Original Code is (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the Initial Developer are Copyright (C) 1994-2009 (non-FIPS only) ssl.sh: skipping All Rights Reserved. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of this file may be used under the terms of (non-FIPS only) ssl.sh: skipping General Public License Version 2 or later (the "GPL"), or (non-FIPS only) ssl.sh: skipping General Public License Version 2.1 or later (the "LGPL"), (non-FIPS only) ssl.sh: skipping the provisions of the GPL or the LGPL are applicable instead (non-FIPS only) ssl.sh: skipping If you wish to allow use of your version of this file only (non-FIPS only) ssl.sh: skipping of either the GPL or the LGPL, and not to allow others to (non-FIPS only) ssl.sh: skipping of this file under the terms of the MPL, indicate your (non-FIPS only) ssl.sh: skipping the provisions above and replace them with the notice (non-FIPS only) ssl.sh: skipping required by the GPL or the LGPL. If you do not delete# the provisions above, a recipient may use your version of this file under (non-FIPS only) ssl.sh: skipping any one of the MPL, the GPL or the LGPL. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:30 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13143 >/dev/null 2>/dev/null selfserv_9793 with PID 13143 found at Mon Mar 26 17:44:30 EDT 2012 selfserv_9793 with PID 13143 started at Mon Mar 26 17:44:30 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:30 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:44:30 EDT 2012 ssl.sh: #1276: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 13143 at Mon Mar 26 17:44:30 EDT 2012 kill -USR1 13143 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13143 killed at Mon Mar 26 17:44:30 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:30 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13218 >/dev/null 2>/dev/null selfserv_9793 with PID 13218 found at Mon Mar 26 17:44:30 EDT 2012 selfserv_9793 with PID 13218 started at Mon Mar 26 17:44:30 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:30 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:44:31 EDT 2012 ssl.sh: #1277: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 13218 at Mon Mar 26 17:44:31 EDT 2012 kill -USR1 13218 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13218 killed at Mon Mar 26 17:44:31 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13293 >/dev/null 2>/dev/null selfserv_9793 with PID 13293 found at Mon Mar 26 17:44:31 EDT 2012 selfserv_9793 with PID 13293 started at Mon Mar 26 17:44:31 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:44:31 EDT 2012 ssl.sh: #1278: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 13293 at Mon Mar 26 17:44:31 EDT 2012 kill -USR1 13293 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13293 killed at Mon Mar 26 17:44:31 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13369 >/dev/null 2>/dev/null selfserv_9793 with PID 13369 found at Mon Mar 26 17:44:31 EDT 2012 selfserv_9793 with PID 13369 started at Mon Mar 26 17:44:31 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:31 EDT 2012 ssl.sh: #1279: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 13369 at Mon Mar 26 17:44:31 EDT 2012 kill -USR1 13369 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13369 killed at Mon Mar 26 17:44:31 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:44:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13445 >/dev/null 2>/dev/null selfserv_9793 with PID 13445 found at Mon Mar 26 17:44:31 EDT 2012 selfserv_9793 with PID 13445 started at Mon Mar 26 17:44:31 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:31 EDT 2012 ssl.sh: #1280: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 13445 at Mon Mar 26 17:44:31 EDT 2012 kill -USR1 13445 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13445 killed at Mon Mar 26 17:44:31 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13521 >/dev/null 2>/dev/null selfserv_9793 with PID 13521 found at Mon Mar 26 17:44:31 EDT 2012 selfserv_9793 with PID 13521 started at Mon Mar 26 17:44:31 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:44:32 EDT 2012 ssl.sh: #1281: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 13521 at Mon Mar 26 17:44:32 EDT 2012 kill -USR1 13521 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13521 killed at Mon Mar 26 17:44:32 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:44:32 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13597 >/dev/null 2>/dev/null selfserv_9793 with PID 13597 found at Mon Mar 26 17:44:32 EDT 2012 selfserv_9793 with PID 13597 started at Mon Mar 26 17:44:32 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:44:32 EDT 2012 ssl.sh: #1282: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 13597 at Mon Mar 26 17:44:32 EDT 2012 kill -USR1 13597 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13597 killed at Mon Mar 26 17:44:32 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9793 starting at Mon Mar 26 17:44:32 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:32 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13679 >/dev/null 2>/dev/null selfserv_9793 with PID 13679 found at Mon Mar 26 17:44:32 EDT 2012 selfserv_9793 with PID 13679 started at Mon Mar 26 17:44:32 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:44:33 EDT 2012 ssl.sh: #1283: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 13679 at Mon Mar 26 17:44:33 EDT 2012 kill -USR1 13679 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13679 killed at Mon Mar 26 17:44:33 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9793 starting at Mon Mar 26 17:44:33 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:33 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13761 >/dev/null 2>/dev/null selfserv_9793 with PID 13761 found at Mon Mar 26 17:44:33 EDT 2012 selfserv_9793 with PID 13761 started at Mon Mar 26 17:44:33 EDT 2012 strsclnt -q -p 9793 -d ../client -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:33 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:44:34 EDT 2012 ssl.sh: #1284: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 13761 at Mon Mar 26 17:44:34 EDT 2012 kill -USR1 13761 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13761 killed at Mon Mar 26 17:44:34 EDT 2012 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9793 starting at Mon Mar 26 17:44:34 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:34 EDT 2012 selfserv_9793 with PID 13896 started at Mon Mar 26 17:44:34 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 13896 >/dev/null 2>/dev/null selfserv_9793 with PID 13896 found at Mon Mar 26 17:44:36 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 13896 at Mon Mar 26 17:44:36 EDT 2012 kill -USR1 13896 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13896 killed at Mon Mar 26 17:44:36 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:37 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15226 >/dev/null 2>/dev/null selfserv_9793 with PID 15226 found at Mon Mar 26 17:44:37 EDT 2012 selfserv_9793 with PID 15226 started at Mon Mar 26 17:44:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1305: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15226 at Mon Mar 26 17:44:37 EDT 2012 kill -USR1 15226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15226 killed at Mon Mar 26 17:44:37 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:37 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15284 >/dev/null 2>/dev/null selfserv_9793 with PID 15284 found at Mon Mar 26 17:44:37 EDT 2012 selfserv_9793 with PID 15284 started at Mon Mar 26 17:44:37 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook Incorrect password/PIN entered. tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #1306: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15284 at Mon Mar 26 17:44:39 EDT 2012 kill -USR1 15284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15284 killed at Mon Mar 26 17:44:39 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:39 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:39 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15347 >/dev/null 2>/dev/null selfserv_9793 with PID 15347 found at Mon Mar 26 17:44:39 EDT 2012 selfserv_9793 with PID 15347 started at Mon Mar 26 17:44:39 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15347 at Mon Mar 26 17:44:39 EDT 2012 kill -USR1 15347 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15347 killed at Mon Mar 26 17:44:39 EDT 2012 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:39 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:39 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15411 >/dev/null 2>/dev/null selfserv_9793 with PID 15411 found at Mon Mar 26 17:44:39 EDT 2012 selfserv_9793 with PID 15411 started at Mon Mar 26 17:44:39 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1308: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15411 at Mon Mar 26 17:44:39 EDT 2012 kill -USR1 15411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15411 killed at Mon Mar 26 17:44:39 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:40 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:40 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15469 >/dev/null 2>/dev/null selfserv_9793 with PID 15469 found at Mon Mar 26 17:44:40 EDT 2012 selfserv_9793 with PID 15469 started at Mon Mar 26 17:44:40 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. tstclnt: exiting with return code 254 ssl.sh: #1309: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15469 at Mon Mar 26 17:44:43 EDT 2012 kill -USR1 15469 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15469 killed at Mon Mar 26 17:44:43 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:43 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15526 >/dev/null 2>/dev/null selfserv_9793 with PID 15526 found at Mon Mar 26 17:44:43 EDT 2012 selfserv_9793 with PID 15526 started at Mon Mar 26 17:44:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15526 at Mon Mar 26 17:44:43 EDT 2012 kill -USR1 15526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15526 killed at Mon Mar 26 17:44:43 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:43 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15589 >/dev/null 2>/dev/null selfserv_9793 with PID 15589 found at Mon Mar 26 17:44:43 EDT 2012 selfserv_9793 with PID 15589 started at Mon Mar 26 17:44:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1311: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15589 at Mon Mar 26 17:44:43 EDT 2012 kill -USR1 15589 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15589 killed at Mon Mar 26 17:44:43 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:43 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15647 >/dev/null 2>/dev/null selfserv_9793 with PID 15647 found at Mon Mar 26 17:44:43 EDT 2012 selfserv_9793 with PID 15647 started at Mon Mar 26 17:44:43 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. tstclnt: exiting with return code 254 ssl.sh: #1312: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15647 at Mon Mar 26 17:44:45 EDT 2012 kill -USR1 15647 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15647 killed at Mon Mar 26 17:44:45 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:45 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15704 >/dev/null 2>/dev/null selfserv_9793 with PID 15704 found at Mon Mar 26 17:44:45 EDT 2012 selfserv_9793 with PID 15704 started at Mon Mar 26 17:44:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15704 at Mon Mar 26 17:44:45 EDT 2012 kill -USR1 15704 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15704 killed at Mon Mar 26 17:44:45 EDT 2012 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:45 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15767 >/dev/null 2>/dev/null selfserv_9793 with PID 15767 found at Mon Mar 26 17:44:46 EDT 2012 selfserv_9793 with PID 15767 started at Mon Mar 26 17:44:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1314: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15767 at Mon Mar 26 17:44:46 EDT 2012 kill -USR1 15767 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15767 killed at Mon Mar 26 17:44:46 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:44:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15825 >/dev/null 2>/dev/null selfserv_9793 with PID 15825 found at Mon Mar 26 17:44:46 EDT 2012 selfserv_9793 with PID 15825 started at Mon Mar 26 17:44:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. tstclnt: exiting with return code 254 ssl.sh: #1315: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15825 at Mon Mar 26 17:44:48 EDT 2012 kill -USR1 15825 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15825 killed at Mon Mar 26 17:44:48 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15882 >/dev/null 2>/dev/null selfserv_9793 with PID 15882 found at Mon Mar 26 17:44:48 EDT 2012 selfserv_9793 with PID 15882 started at Mon Mar 26 17:44:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15882 at Mon Mar 26 17:44:48 EDT 2012 kill -USR1 15882 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15882 killed at Mon Mar 26 17:44:48 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client fips =============================== ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping 2.0/LGPL 2.1 (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping this file are subject to the Mozilla Public License Version (non-FIPS only) ssl.sh: skipping you may not use this file except in compliance with (non-FIPS only) ssl.sh: skipping may obtain a copy of the License at (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the License is distributed on an "AS IS" basis, (non-FIPS only) ssl.sh: skipping ANY KIND, either express or implied. See the License (non-FIPS only) ssl.sh: skipping language governing rights and limitations under the (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping is the Netscape security libraries. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of the Original Code is (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the Initial Developer are Copyright (C) 1994-2009 (non-FIPS only) ssl.sh: skipping All Rights Reserved. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of this file may be used under the terms of (non-FIPS only) ssl.sh: skipping General Public License Version 2 or later (the "GPL"), or (non-FIPS only) ssl.sh: skipping General Public License Version 2.1 or later (the "LGPL"), (non-FIPS only) ssl.sh: skipping the provisions of the GPL or the LGPL are applicable instead (non-FIPS only) ssl.sh: skipping If you wish to allow use of your version of this file only (non-FIPS only) ssl.sh: skipping of either the GPL or the LGPL, and not to allow others to (non-FIPS only) ssl.sh: skipping of this file under the terms of the MPL, indicate your (non-FIPS only) ssl.sh: skipping the provisions above and replace them with the notice (non-FIPS only) ssl.sh: skipping required by the GPL or the LGPL. If you do not delete# the provisions above, a recipient may use your version of this file under (non-FIPS only) ssl.sh: skipping any one of the MPL, the GPL or the LGPL. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16244 >/dev/null 2>/dev/null selfserv_9793 with PID 16244 found at Mon Mar 26 17:44:49 EDT 2012 selfserv_9793 with PID 16244 started at Mon Mar 26 17:44:49 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:49 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:44:49 EDT 2012 ssl.sh: #1317: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16244 at Mon Mar 26 17:44:49 EDT 2012 kill -USR1 16244 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16244 killed at Mon Mar 26 17:44:49 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16319 >/dev/null 2>/dev/null selfserv_9793 with PID 16319 found at Mon Mar 26 17:44:49 EDT 2012 selfserv_9793 with PID 16319 started at Mon Mar 26 17:44:49 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:49 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:44:50 EDT 2012 ssl.sh: #1318: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16319 at Mon Mar 26 17:44:50 EDT 2012 kill -USR1 16319 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16319 killed at Mon Mar 26 17:44:50 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16394 >/dev/null 2>/dev/null selfserv_9793 with PID 16394 found at Mon Mar 26 17:44:50 EDT 2012 selfserv_9793 with PID 16394 started at Mon Mar 26 17:44:50 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:50 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:44:50 EDT 2012 ssl.sh: #1319: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16394 at Mon Mar 26 17:44:50 EDT 2012 kill -USR1 16394 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16394 killed at Mon Mar 26 17:44:50 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16470 >/dev/null 2>/dev/null selfserv_9793 with PID 16470 found at Mon Mar 26 17:44:50 EDT 2012 selfserv_9793 with PID 16470 started at Mon Mar 26 17:44:50 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:50 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:50 EDT 2012 ssl.sh: #1320: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16470 at Mon Mar 26 17:44:50 EDT 2012 kill -USR1 16470 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16470 killed at Mon Mar 26 17:44:50 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:44:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16546 >/dev/null 2>/dev/null selfserv_9793 with PID 16546 found at Mon Mar 26 17:44:50 EDT 2012 selfserv_9793 with PID 16546 started at Mon Mar 26 17:44:50 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:50 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:44:51 EDT 2012 ssl.sh: #1321: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16546 at Mon Mar 26 17:44:51 EDT 2012 kill -USR1 16546 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16546 killed at Mon Mar 26 17:44:51 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:44:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16622 >/dev/null 2>/dev/null selfserv_9793 with PID 16622 found at Mon Mar 26 17:44:51 EDT 2012 selfserv_9793 with PID 16622 started at Mon Mar 26 17:44:51 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:44:51 EDT 2012 ssl.sh: #1322: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16622 at Mon Mar 26 17:44:51 EDT 2012 kill -USR1 16622 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16622 killed at Mon Mar 26 17:44:51 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:44:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:44:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16698 >/dev/null 2>/dev/null selfserv_9793 with PID 16698 found at Mon Mar 26 17:44:51 EDT 2012 selfserv_9793 with PID 16698 started at Mon Mar 26 17:44:51 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:44:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:44:51 EDT 2012 ssl.sh: #1323: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16698 at Mon Mar 26 17:44:51 EDT 2012 kill -USR1 16698 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16698 killed at Mon Mar 26 17:44:51 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1324: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -list ssl.sh: #1325: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1326: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Mon Mar 26 17:44:51 EDT 2012 Running tests for ocsp TIMESTAMP ocsp BEGIN: Mon Mar 26 17:44:51 EDT 2012 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Mon Mar 26 17:44:51 EDT 2012 Running tests for merge TIMESTAMP merge BEGIN: Mon Mar 26 17:44:51 EDT 2012 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v3.18664 -t Test2 -f ../tests.pw merge.sh: #1327: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1328: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1329: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1330: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1331: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1332: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:26 2012 Not After : Sun Mar 26 21:41:26 2017 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:8c:37:6f:a0:dc:a3:c5:72:b4:fd:ff:95:01:a3:fe: e3:6e:8b:d5:6f:d6:c6:fe:f7:3f:e0:3e:74:8b:b1:53: 1e:26:80:ab:c7:7d:77:52:04:ac:e5:72:59:a2:a9:11: e5:53:dc:6b:46:e6:60:cb:52:d2:b1:f2:85:f2:76:96: 7b:d1:47:ad:50:4b:8e:2b:18:8c:d7:71:83:2f:35:a4: 2f:a0:3f:ae:e1:f9:2b:a7:de:3f:e1:e8:06:08:f0:1d: 2b:8d:70:f5:38:1e:ef:6f:7f:fd:f0:80:09:28:66:c1: 72:df:6d:93:26:90:35:ed:85:ac:ef:b4:a8:17:c0:99 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6a:5d:5c:4c:cc:a6:6d:24:6b:b1:4b:38:88:57:9e:07: d1:72:6e:f2:97:66:66:83:f8:85:c8:66:aa:62:26:da: 80:ff:8d:30:c4:40:73:9f:73:47:2b:9f:07:c9:96:d0: 2b:d9:7a:e0:07:da:56:e5:02:27:d2:1f:d6:0c:16:7b: a0:62:76:76:71:6e:e6:bb:ad:55:9b:1a:f8:95:6a:97: 8c:b1:79:ba:9d:d2:8d:66:0d:70:5b:0c:5a:22:70:4d: 8d:89:61:45:b4:ba:35:4d:39:8f:16:20:cf:64:62:fa: d6:4c:6b:f4:bd:ca:f1:57:7b:77:8e:e4:92:f5:bf:60 Fingerprint (MD5): 05:2A:3D:41:41:87:01:D4:C8:94:AD:DA:A2:91:6A:2F Fingerprint (SHA1): 82:C7:44:00:39:55:97:25:4E:67:83:66:E9:60:23:22:F0:67:A9:C2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #1333: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:26 2012 Not After : Sun Mar 26 21:41:26 2017 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:4e:cf:0a:3d:13:8e:03:cc:8d:9d:a3:38:76:42:0e: fd:70:4b:16:c9:4a:51:3f:98:9d:c7:07:29:47:5a:f7: b9:bb:42:22:a9:c1:9e:dd:8f:69:bf:1e:0d:72:36:b6: 4b:40:6b:35:84:42:4f:e9:54:f6:f2:e8:61:78:b9:b3: a4:d8:bb:bd:e6:45:42:2d:88:ba:92:a2:0b:6d:c2:14: a7:84:77:c5:1f:97:1b:4a:32:7e:c3:11:cc:1d:26:a5: a3:58:5d:53:65:b2:36:c3:88:56:08:b7:e2:42:2a:d8: dd:84:fd:9d:64:29:93:7d:c9:40:99:56:f6:55:50:e5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:7d:7a:03:0d:1d:fa:6c:c8:37:7c:78:5d:e2:cb:f8: cf:41:71:f5:ea:70:27:60:52:f6:7e:44:ee:2f:fc:46: 0c:97:bc:68:54:6f:43:4e:26:69:7f:67:5d:ea:4b:c8: 2a:09:73:2f:03:ee:62:69:ec:03:6f:77:93:d5:f2:5e: 2a:14:2c:d7:10:6d:0c:00:b0:6f:9a:ec:3f:74:7e:e0: 3e:b8:17:f3:b0:68:a4:c6:cb:50:ba:1a:06:54:8c:67: 17:34:79:65:bd:2e:13:da:28:a7:fc:83:29:a3:9e:22: 47:4d:a4:f3:6f:ba:53:33:e7:af:b0:09:9d:71:09:62 Fingerprint (MD5): 9A:BB:7D:E9:0E:D2:98:51:28:DA:46:D9:4D:F0:4B:BB Fingerprint (SHA1): D9:9B:D8:B9:BA:C9:3D:5E:5E:90:1B:A3:95:A0:6D:B5:AB:AB:87:28 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #1334: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1335: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Alice u,u,u bob@bogus.com ,, eve@bogus.com ,, Dave u,u,u localhost.localdomain u,u,u clientCA T,C,C chain-2-clientCA ,, Alice #1 ,, Alice #3 ,, Alice #100 ,, TestCA CT,C,C localhost-sni.localdomain u,u,u ExtendedSSLUser u,u,u serverCA C,C,C chain-1-clientCA ,, Alice #2 ,, Alice #99 ,, Alice #4 ,, CRL names CRL Type TestCA CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v3.18664 -t Test2 -f ../tests.pw merge.sh: #1336: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v1.18664 -t Test1 -f ../tests.pw merge.sh: #1337: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #1338: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #1339: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #1340: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Mar 26 21:41:32 2012 Entry (1): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:41:17 2012 Entry Extensions: Name: CRL reason code Entry (2): Serial Number: 42 (0x2a) Revocation Date: Mon Mar 26 21:41:30 2012 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #1341: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Mon Mar 26 17:44:52 EDT 2012 Running tests for pkits TIMESTAMP pkits BEGIN: Mon Mar 26 17:44:52 EDT 2012 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Mon Mar 26 17:44:52 EDT 2012 Running tests for chains TIMESTAMP chains BEGIN: Mon Mar 26 17:44:52 EDT 2012 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1342: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174453 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1343: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1344: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1345: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174454 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1346: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1347: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1348: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1349: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174455 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1350: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #1351: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174456 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1352: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #1353: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1354: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1355: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1356: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 326174457 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1357: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der chains.sh: #1358: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1359: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1360: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1361: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174454 (0x137106f6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:44:53 2012 Not After : Sun Mar 26 21:44:53 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:e6:c7:8d:c7:ba:62:4a:61:50:4d:87:69:f9:27:0b: af:23:43:03:a8:61:28:ff:a0:18:d6:f0:8e:e8:bc:dd: 03:ac:59:7b:df:83:80:8e:cf:27:3b:4c:32:73:e7:93: 90:58:f2:f9:79:87:2d:6a:7f:4f:64:e6:29:b0:e0:43: f2:33:58:2d:c7:5f:8d:08:af:c4:d9:2a:9e:1b:b3:c4: 5b:03:36:a9:77:ae:ed:fc:1e:e6:50:aa:33:13:68:16: 76:12:7b:d7:36:ab:d6:29:63:4e:c7:ee:07:55:f0:81: 6a:4b:d9:0d:f7:f2:ce:bf:fb:8c:1c:a4:01:c8:74:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 96:fd:f8:2b:a3:f7:50:dc:df:c9:a2:45:b8:87:25:7a: 32:25:b3:cf:ef:7f:02:27:3f:a0:8f:34:13:4a:f1:2a: 75:98:97:a1:4d:b2:fa:ec:aa:2e:39:64:8c:76:cf:af: ea:2e:17:ff:b6:27:86:94:30:dc:36:b9:73:95:62:58: f9:cc:95:50:e0:a7:bf:2e:42:3e:29:f5:36:a7:39:64: bc:89:3c:21:29:1d:3a:83:78:d9:0e:7c:01:48:da:62: c1:8f:7c:f9:ca:0a:df:2b:34:b6:d6:01:cb:ba:20:5e: 97:66:88:8d:3b:c3:f4:01:a8:a9:79:8c:fc:d9:0c:03 Fingerprint (MD5): 1C:39:89:84:6B:DB:CE:FE:70:4D:F4:08:F3:E8:83:92 Fingerprint (SHA1): F6:A4:B8:F0:2C:8E:32:D5:B7:D2:AF:98:0A:E4:BE:98:5E:F1:32:62 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1362: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174453 (0x137106f5) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:44:53 2012 Not After : Sun Mar 26 21:44:53 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:05:2d:0e:37:73:23:7f:4a:87:e8:2c:bd:2b:27:9e: af:d8:34:1f:39:0e:4b:87:57:e2:f9:81:5b:e9:67:8c: f5:e4:00:66:6b:19:f7:90:dc:6d:67:eb:c0:ee:19:46: 72:62:e0:af:8e:77:16:9e:a9:59:79:fb:f6:4b:1d:27: d2:83:33:9b:c2:59:02:9d:08:6f:68:ec:86:98:df:e0: 4a:e1:08:b6:58:18:90:b8:3a:ae:21:eb:a4:59:8f:56: c6:e1:54:81:9d:ba:12:91:0b:a4:57:05:3a:ca:f9:7c: 31:9e:18:fd:49:28:3d:25:6d:7f:cf:25:cc:8c:e7:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:f5:42:de:30:79:ab:fb:ab:69:93:ab:cd:1a:ff:8d: 81:3c:88:34:03:a2:6f:d5:6c:be:a1:54:41:92:8d:45: 3f:27:bd:67:a7:50:6b:e9:d5:d5:a7:a2:0c:9e:59:1e: 63:6d:65:67:14:99:fe:7d:02:ac:09:92:bd:2a:5f:ee: 15:b4:d3:81:fc:a6:6f:ec:14:c5:aa:f8:1d:9f:09:29: f4:a2:3d:32:50:59:0b:ff:f3:4a:f5:4e:a5:f3:97:cc: 23:7a:48:f6:99:1e:0b:d8:d4:cd:fc:16:be:50:a5:90: f0:7d:87:c2:b5:c1:c6:83:12:a7:7e:c5:b7:f9:a0:da Fingerprint (MD5): 2C:FB:16:C0:BA:B8:1A:9B:5D:DC:4D:F2:67:1D:AE:DD Fingerprint (SHA1): 7D:DB:B7:BD:FF:91:95:5C:29:50:5F:E5:1D:EE:D6:6B:0C:34:2D:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1363: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1364: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1365: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1366: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174453 (0x137106f5) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:44:53 2012 Not After : Sun Mar 26 21:44:53 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:05:2d:0e:37:73:23:7f:4a:87:e8:2c:bd:2b:27:9e: af:d8:34:1f:39:0e:4b:87:57:e2:f9:81:5b:e9:67:8c: f5:e4:00:66:6b:19:f7:90:dc:6d:67:eb:c0:ee:19:46: 72:62:e0:af:8e:77:16:9e:a9:59:79:fb:f6:4b:1d:27: d2:83:33:9b:c2:59:02:9d:08:6f:68:ec:86:98:df:e0: 4a:e1:08:b6:58:18:90:b8:3a:ae:21:eb:a4:59:8f:56: c6:e1:54:81:9d:ba:12:91:0b:a4:57:05:3a:ca:f9:7c: 31:9e:18:fd:49:28:3d:25:6d:7f:cf:25:cc:8c:e7:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:f5:42:de:30:79:ab:fb:ab:69:93:ab:cd:1a:ff:8d: 81:3c:88:34:03:a2:6f:d5:6c:be:a1:54:41:92:8d:45: 3f:27:bd:67:a7:50:6b:e9:d5:d5:a7:a2:0c:9e:59:1e: 63:6d:65:67:14:99:fe:7d:02:ac:09:92:bd:2a:5f:ee: 15:b4:d3:81:fc:a6:6f:ec:14:c5:aa:f8:1d:9f:09:29: f4:a2:3d:32:50:59:0b:ff:f3:4a:f5:4e:a5:f3:97:cc: 23:7a:48:f6:99:1e:0b:d8:d4:cd:fc:16:be:50:a5:90: f0:7d:87:c2:b5:c1:c6:83:12:a7:7e:c5:b7:f9:a0:da Fingerprint (MD5): 2C:FB:16:C0:BA:B8:1A:9B:5D:DC:4D:F2:67:1D:AE:DD Fingerprint (SHA1): 7D:DB:B7:BD:FF:91:95:5C:29:50:5F:E5:1D:EE:D6:6B:0C:34:2D:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1367: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174454 (0x137106f6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:44:53 2012 Not After : Sun Mar 26 21:44:53 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:e6:c7:8d:c7:ba:62:4a:61:50:4d:87:69:f9:27:0b: af:23:43:03:a8:61:28:ff:a0:18:d6:f0:8e:e8:bc:dd: 03:ac:59:7b:df:83:80:8e:cf:27:3b:4c:32:73:e7:93: 90:58:f2:f9:79:87:2d:6a:7f:4f:64:e6:29:b0:e0:43: f2:33:58:2d:c7:5f:8d:08:af:c4:d9:2a:9e:1b:b3:c4: 5b:03:36:a9:77:ae:ed:fc:1e:e6:50:aa:33:13:68:16: 76:12:7b:d7:36:ab:d6:29:63:4e:c7:ee:07:55:f0:81: 6a:4b:d9:0d:f7:f2:ce:bf:fb:8c:1c:a4:01:c8:74:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 96:fd:f8:2b:a3:f7:50:dc:df:c9:a2:45:b8:87:25:7a: 32:25:b3:cf:ef:7f:02:27:3f:a0:8f:34:13:4a:f1:2a: 75:98:97:a1:4d:b2:fa:ec:aa:2e:39:64:8c:76:cf:af: ea:2e:17:ff:b6:27:86:94:30:dc:36:b9:73:95:62:58: f9:cc:95:50:e0:a7:bf:2e:42:3e:29:f5:36:a7:39:64: bc:89:3c:21:29:1d:3a:83:78:d9:0e:7c:01:48:da:62: c1:8f:7c:f9:ca:0a:df:2b:34:b6:d6:01:cb:ba:20:5e: 97:66:88:8d:3b:c3:f4:01:a8:a9:79:8c:fc:d9:0c:03 Fingerprint (MD5): 1C:39:89:84:6B:DB:CE:FE:70:4D:F4:08:F3:E8:83:92 Fingerprint (SHA1): F6:A4:B8:F0:2C:8E:32:D5:B7:D2:AF:98:0A:E4:BE:98:5E:F1:32:62 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1368: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1369: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1370: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1371: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1372: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1373: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174454 (0x137106f6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:44:53 2012 Not After : Sun Mar 26 21:44:53 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:e6:c7:8d:c7:ba:62:4a:61:50:4d:87:69:f9:27:0b: af:23:43:03:a8:61:28:ff:a0:18:d6:f0:8e:e8:bc:dd: 03:ac:59:7b:df:83:80:8e:cf:27:3b:4c:32:73:e7:93: 90:58:f2:f9:79:87:2d:6a:7f:4f:64:e6:29:b0:e0:43: f2:33:58:2d:c7:5f:8d:08:af:c4:d9:2a:9e:1b:b3:c4: 5b:03:36:a9:77:ae:ed:fc:1e:e6:50:aa:33:13:68:16: 76:12:7b:d7:36:ab:d6:29:63:4e:c7:ee:07:55:f0:81: 6a:4b:d9:0d:f7:f2:ce:bf:fb:8c:1c:a4:01:c8:74:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 96:fd:f8:2b:a3:f7:50:dc:df:c9:a2:45:b8:87:25:7a: 32:25:b3:cf:ef:7f:02:27:3f:a0:8f:34:13:4a:f1:2a: 75:98:97:a1:4d:b2:fa:ec:aa:2e:39:64:8c:76:cf:af: ea:2e:17:ff:b6:27:86:94:30:dc:36:b9:73:95:62:58: f9:cc:95:50:e0:a7:bf:2e:42:3e:29:f5:36:a7:39:64: bc:89:3c:21:29:1d:3a:83:78:d9:0e:7c:01:48:da:62: c1:8f:7c:f9:ca:0a:df:2b:34:b6:d6:01:cb:ba:20:5e: 97:66:88:8d:3b:c3:f4:01:a8:a9:79:8c:fc:d9:0c:03 Fingerprint (MD5): 1C:39:89:84:6B:DB:CE:FE:70:4D:F4:08:F3:E8:83:92 Fingerprint (SHA1): F6:A4:B8:F0:2C:8E:32:D5:B7:D2:AF:98:0A:E4:BE:98:5E:F1:32:62 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1374: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174454 (0x137106f6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:44:53 2012 Not After : Sun Mar 26 21:44:53 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:e6:c7:8d:c7:ba:62:4a:61:50:4d:87:69:f9:27:0b: af:23:43:03:a8:61:28:ff:a0:18:d6:f0:8e:e8:bc:dd: 03:ac:59:7b:df:83:80:8e:cf:27:3b:4c:32:73:e7:93: 90:58:f2:f9:79:87:2d:6a:7f:4f:64:e6:29:b0:e0:43: f2:33:58:2d:c7:5f:8d:08:af:c4:d9:2a:9e:1b:b3:c4: 5b:03:36:a9:77:ae:ed:fc:1e:e6:50:aa:33:13:68:16: 76:12:7b:d7:36:ab:d6:29:63:4e:c7:ee:07:55:f0:81: 6a:4b:d9:0d:f7:f2:ce:bf:fb:8c:1c:a4:01:c8:74:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 96:fd:f8:2b:a3:f7:50:dc:df:c9:a2:45:b8:87:25:7a: 32:25:b3:cf:ef:7f:02:27:3f:a0:8f:34:13:4a:f1:2a: 75:98:97:a1:4d:b2:fa:ec:aa:2e:39:64:8c:76:cf:af: ea:2e:17:ff:b6:27:86:94:30:dc:36:b9:73:95:62:58: f9:cc:95:50:e0:a7:bf:2e:42:3e:29:f5:36:a7:39:64: bc:89:3c:21:29:1d:3a:83:78:d9:0e:7c:01:48:da:62: c1:8f:7c:f9:ca:0a:df:2b:34:b6:d6:01:cb:ba:20:5e: 97:66:88:8d:3b:c3:f4:01:a8:a9:79:8c:fc:d9:0c:03 Fingerprint (MD5): 1C:39:89:84:6B:DB:CE:FE:70:4D:F4:08:F3:E8:83:92 Fingerprint (SHA1): F6:A4:B8:F0:2C:8E:32:D5:B7:D2:AF:98:0A:E4:BE:98:5E:F1:32:62 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1375: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1376: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1377: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1378: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1379: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1380: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174453 (0x137106f5) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:44:53 2012 Not After : Sun Mar 26 21:44:53 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:05:2d:0e:37:73:23:7f:4a:87:e8:2c:bd:2b:27:9e: af:d8:34:1f:39:0e:4b:87:57:e2:f9:81:5b:e9:67:8c: f5:e4:00:66:6b:19:f7:90:dc:6d:67:eb:c0:ee:19:46: 72:62:e0:af:8e:77:16:9e:a9:59:79:fb:f6:4b:1d:27: d2:83:33:9b:c2:59:02:9d:08:6f:68:ec:86:98:df:e0: 4a:e1:08:b6:58:18:90:b8:3a:ae:21:eb:a4:59:8f:56: c6:e1:54:81:9d:ba:12:91:0b:a4:57:05:3a:ca:f9:7c: 31:9e:18:fd:49:28:3d:25:6d:7f:cf:25:cc:8c:e7:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:f5:42:de:30:79:ab:fb:ab:69:93:ab:cd:1a:ff:8d: 81:3c:88:34:03:a2:6f:d5:6c:be:a1:54:41:92:8d:45: 3f:27:bd:67:a7:50:6b:e9:d5:d5:a7:a2:0c:9e:59:1e: 63:6d:65:67:14:99:fe:7d:02:ac:09:92:bd:2a:5f:ee: 15:b4:d3:81:fc:a6:6f:ec:14:c5:aa:f8:1d:9f:09:29: f4:a2:3d:32:50:59:0b:ff:f3:4a:f5:4e:a5:f3:97:cc: 23:7a:48:f6:99:1e:0b:d8:d4:cd:fc:16:be:50:a5:90: f0:7d:87:c2:b5:c1:c6:83:12:a7:7e:c5:b7:f9:a0:da Fingerprint (MD5): 2C:FB:16:C0:BA:B8:1A:9B:5D:DC:4D:F2:67:1D:AE:DD Fingerprint (SHA1): 7D:DB:B7:BD:FF:91:95:5C:29:50:5F:E5:1D:EE:D6:6B:0C:34:2D:21 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1381: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174453 (0x137106f5) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:44:53 2012 Not After : Sun Mar 26 21:44:53 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:05:2d:0e:37:73:23:7f:4a:87:e8:2c:bd:2b:27:9e: af:d8:34:1f:39:0e:4b:87:57:e2:f9:81:5b:e9:67:8c: f5:e4:00:66:6b:19:f7:90:dc:6d:67:eb:c0:ee:19:46: 72:62:e0:af:8e:77:16:9e:a9:59:79:fb:f6:4b:1d:27: d2:83:33:9b:c2:59:02:9d:08:6f:68:ec:86:98:df:e0: 4a:e1:08:b6:58:18:90:b8:3a:ae:21:eb:a4:59:8f:56: c6:e1:54:81:9d:ba:12:91:0b:a4:57:05:3a:ca:f9:7c: 31:9e:18:fd:49:28:3d:25:6d:7f:cf:25:cc:8c:e7:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:f5:42:de:30:79:ab:fb:ab:69:93:ab:cd:1a:ff:8d: 81:3c:88:34:03:a2:6f:d5:6c:be:a1:54:41:92:8d:45: 3f:27:bd:67:a7:50:6b:e9:d5:d5:a7:a2:0c:9e:59:1e: 63:6d:65:67:14:99:fe:7d:02:ac:09:92:bd:2a:5f:ee: 15:b4:d3:81:fc:a6:6f:ec:14:c5:aa:f8:1d:9f:09:29: f4:a2:3d:32:50:59:0b:ff:f3:4a:f5:4e:a5:f3:97:cc: 23:7a:48:f6:99:1e:0b:d8:d4:cd:fc:16:be:50:a5:90: f0:7d:87:c2:b5:c1:c6:83:12:a7:7e:c5:b7:f9:a0:da Fingerprint (MD5): 2C:FB:16:C0:BA:B8:1A:9B:5D:DC:4D:F2:67:1D:AE:DD Fingerprint (SHA1): 7D:DB:B7:BD:FF:91:95:5C:29:50:5F:E5:1D:EE:D6:6B:0C:34:2D:21 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1382: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1383: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174458 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1384: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1385: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1386: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174459 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1387: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1388: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1389: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174460 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1390: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1391: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1392: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174461 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1393: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1394: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1395: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174462 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1396: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1397: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1398: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174463 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1399: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1400: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1401: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174464 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1402: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1403: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1404: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174465 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1405: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1406: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1407: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174466 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1408: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1409: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1410: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1411: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 326174467 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1412: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der chains.sh: #1413: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 326174468 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1414: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der chains.sh: #1415: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 326174469 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1416: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der chains.sh: #1417: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1418: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1419: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1420: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 326174470 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1421: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der chains.sh: #1422: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 326174471 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1423: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der chains.sh: #1424: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 326174472 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1425: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der chains.sh: #1426: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1427: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1428: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1429: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 326174473 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1430: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der chains.sh: #1431: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 326174474 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1432: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der chains.sh: #1433: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 326174475 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1434: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der chains.sh: #1435: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1436: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1437: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1438: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 326174476 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1439: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der chains.sh: #1440: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 326174477 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1441: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der chains.sh: #1442: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 326174478 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1443: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der chains.sh: #1444: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1445: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1446: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1447: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 326174479 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1448: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der chains.sh: #1449: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1450: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1451: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174480 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1452: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1453: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174458 (0x137106fa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 26 21:44:55 2012 Not After : Sun Mar 26 21:44:55 2062 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:0e:4d:18:cb:f4:5b:8c:e9:4e:ce:fb:a1:b9:2b:e8: 7c:e8:74:d6:61:9e:3e:cc:8a:4c:ee:7f:ac:61:ab:e9: dc:41:11:c5:ac:61:f6:c1:0d:22:d3:9d:5a:23:e7:5a: 3a:20:89:9a:da:5a:30:de:2f:72:db:a4:d6:25:7d:bc: 0b:6c:f5:47:51:02:3e:d1:26:ef:d1:c4:97:8d:b1:e5: e3:7c:3b:b8:5d:47:4e:a1:c3:89:4b:b3:f3:7a:d4:75: 3a:5e:d4:94:65:c4:1f:7d:f4:0d:f6:22:a1:72:76:15: a6:b7:81:f0:48:18:aa:93:eb:df:70:2f:93:f8:51:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b8:1d:6f:5a:33:ed:38:33:9e:17:5c:16:21:0f:4a:1b: 5e:a6:92:ab:49:d4:31:9c:3d:7d:de:ac:41:70:be:56: e7:d3:10:3e:26:a5:c1:eb:5a:63:91:c0:3b:8c:58:79: 98:e2:2f:d4:f9:ec:07:91:0d:54:b8:29:3f:b4:2b:e4: fd:60:f3:e8:77:70:71:01:f1:ae:25:89:50:c9:96:3e: 2a:a6:c6:1b:6b:c0:12:47:a3:52:2d:9a:d5:e4:db:eb: 86:82:bc:74:62:a1:af:46:65:6f:a5:90:16:9b:05:07: 32:0d:49:c1:bd:8c:75:61:91:a5:f8:ec:96:59:76:a3 Fingerprint (MD5): 5E:08:BD:4C:6B:77:DE:F4:67:A4:57:23:81:ED:88:6C Fingerprint (SHA1): C1:8D:DE:C4:5C:FA:4D:3D:B9:FF:B2:A5:9F:1B:7E:36:0E:70:C5:05 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1454: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174459 (0x137106fb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 26 21:44:55 2012 Not After : Sun Mar 26 21:44:55 2062 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:b6:5c:41:d0:28:e2:43:6a:b9:93:42:ff:f2:87:4b: d4:bb:65:2f:b3:f9:55:fd:74:7f:a8:78:88:d8:f2:39: c0:d1:de:33:5c:e6:16:f9:71:06:22:83:a3:53:95:16: ee:fd:07:22:bc:ad:b1:4d:20:d8:29:40:dc:f4:0c:2b: ac:62:18:06:03:76:69:0f:1f:ce:31:d7:a1:76:e1:c8: 45:30:14:c2:e0:af:e2:2f:77:9e:89:0d:91:93:7a:7a: 3e:d2:1d:65:53:60:9d:03:44:24:a1:ed:38:cc:81:7c: a2:48:8e:ee:ef:63:e2:fa:30:a1:0c:76:ce:d9:d2:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:cb:f7:24:0c:67:05:3c:c0:95:7b:27:09:04:6e:2b: 9c:08:4f:0b:93:4b:f7:42:8f:f8:4c:5d:a4:4e:e1:27: 44:17:94:78:49:f3:97:cb:d9:cd:fc:7a:b0:8e:4c:ea: 96:e6:eb:5d:d1:ba:11:a4:73:ee:da:02:ac:4e:0a:b9: 7d:3d:ba:8c:cd:9f:f1:4e:18:a8:72:e2:38:74:a0:ec: 98:8f:78:b3:f8:3f:75:41:5e:bc:39:93:03:85:89:f0: 55:b2:88:71:6a:3a:80:d6:92:f6:5d:fa:5e:6f:1f:4f: 80:50:96:3f:6c:0c:ac:6e:e0:55:bc:70:76:0a:31:ad Fingerprint (MD5): BD:EA:5F:CA:F8:F2:08:78:86:71:8F:84:48:BC:F8:95 Fingerprint (SHA1): FB:D0:81:88:73:F8:10:97:4F:15:A7:A0:68:B7:A4:13:E0:1E:EA:50 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1455: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174460 (0x137106fc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 26 21:44:55 2012 Not After : Sun Mar 26 21:44:55 2062 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:ed:9b:e5:9f:42:5e:42:97:69:1f:14:36:56:e1:8c: aa:3d:6b:5f:5d:d2:74:8e:1e:9f:09:4a:7e:b1:3d:d1: 03:01:8f:d3:0c:0f:89:24:d3:f8:ab:27:3b:ed:5a:ca: 9c:5e:3d:69:c2:28:c6:e6:85:dc:fe:13:e5:ab:06:c4: 3e:e4:94:51:43:9e:00:8d:89:d0:3e:ed:84:07:ef:c9: 0b:a8:3a:0f:a3:b9:f7:0f:b8:b8:0d:d8:39:33:0f:05: 85:5f:33:b2:e5:15:87:02:11:09:ef:fb:b6:1e:01:a9: f6:f5:f4:1a:8b:c5:8b:1b:f1:ab:98:2b:1d:3b:c5:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 51:b5:33:b4:3e:99:08:b6:fe:7f:42:93:15:b2:7f:a2: 35:91:d1:8b:1d:6a:31:0a:99:a4:9e:35:e0:8a:1d:e0: 9a:fb:57:5f:dd:aa:3e:0f:84:ee:a9:87:d2:be:bc:94: c9:18:82:6d:0b:3a:c0:6a:22:ec:a9:5f:d2:c6:3c:ee: 52:1a:96:1a:31:95:3e:16:58:9c:37:c8:38:97:a3:34: 0f:a5:9c:5d:e3:fb:18:cc:55:b2:d8:0f:97:3f:9f:f3: 34:73:74:8b:9a:5b:11:f6:73:4e:f0:15:b7:62:07:6e: bd:ab:5d:58:48:1e:e5:0b:98:49:fd:9e:a4:77:82:81 Fingerprint (MD5): BB:A1:9E:E4:52:C7:AB:F0:01:4F:1C:76:46:64:B7:7D Fingerprint (SHA1): D5:B1:0E:5F:F8:36:66:BA:82:60:A7:F1:35:C2:0A:DA:AB:09:C7:21 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1456: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174461 (0x137106fd) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 26 21:44:55 2012 Not After : Sun Mar 26 21:44:55 2062 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:8e:15:d8:01:c6:41:1c:c2:dc:7d:58:78:61:08:dd: 12:6a:6e:57:8d:3e:2a:0a:6b:01:75:56:89:40:c3:c9: a5:45:d7:e1:fd:39:46:3c:2f:38:84:09:64:d1:7c:3a: 9f:65:94:0e:83:45:47:d6:cf:f9:85:3a:ff:57:27:d4: 79:92:0e:fe:5d:e2:33:f2:c5:0e:49:e0:93:b6:52:c8: 24:53:f2:f9:52:5f:9a:44:83:a1:83:7c:f4:27:a8:3b: db:9c:d6:15:fe:dd:cc:88:f8:30:1d:d9:32:d8:0a:11: 8f:19:53:e4:2e:ad:41:22:24:ef:ad:cb:ba:1b:a6:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 30:3a:00:d9:dd:e6:6c:16:b5:0d:de:48:69:a6:84:1a: e9:37:3e:db:f0:3d:ef:ba:c5:bf:1b:ef:ba:6d:ba:8d: d6:d1:d8:59:57:4e:54:67:6e:26:b7:cb:b5:b0:d5:00: 01:9d:3c:15:d6:1e:f0:ca:cd:5a:15:5e:cf:3f:ee:a8: 86:51:24:69:38:2e:d1:5e:3c:20:df:95:86:c9:fb:2e: a5:54:77:34:f3:02:bf:40:ca:9d:42:e3:ec:61:38:02: 22:ae:cb:bc:b7:8e:db:be:73:cd:61:3a:fe:f7:e9:04: 5f:28:4d:f1:1a:b6:7c:02:8f:a9:b8:db:da:e7:aa:28 Fingerprint (MD5): 48:43:53:BB:2B:30:A0:89:A8:9F:34:F4:65:1A:5F:87 Fingerprint (SHA1): 11:83:2C:53:C7:02:0B:2F:21:59:46:AC:67:B0:AE:98:DF:D9:73:94 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1457: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174462 (0x137106fe) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 26 21:44:56 2012 Not After : Sun Mar 26 21:44:56 2062 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:eb:4c:1f:72:7d:b1:57:55:e9:23:b7:65:2d:85:35: ec:d2:a4:ea:69:12:94:8d:c5:f1:ab:e2:df:2c:bd:df: 11:4a:fe:64:08:99:47:6c:3d:9b:b2:a8:41:38:4a:7d: 89:c3:c4:96:7e:c7:1f:ef:35:ce:8b:83:df:bc:bb:29: 16:1c:1f:ed:2d:4d:26:55:5f:62:ce:31:5f:0b:5f:38: c5:09:32:23:ba:b1:56:82:d4:71:40:67:1d:a6:35:6e: 9e:53:d4:dc:fb:39:94:9e:c9:f2:49:f9:77:c2:cf:47: 09:e1:5d:90:d3:ce:da:c5:e0:e4:cc:bf:8c:0c:bb:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:59:0c:cd:72:91:9b:5d:b8:23:9e:be:94:3f:e1:16: c4:02:c7:59:42:68:99:1f:eb:70:bc:d8:44:51:be:96: 1c:f9:61:2d:66:83:b3:35:c2:16:7a:68:c0:9b:27:a6: ff:25:c5:65:04:7e:81:8d:9b:b9:a5:4c:bc:c6:68:69: 6f:59:9f:15:6c:1e:a7:28:ce:2e:34:f2:19:1c:3c:9e: 8f:43:b3:14:9b:a4:87:15:ee:9b:87:cb:38:aa:e8:62: 9d:a3:51:e1:26:bc:27:0a:81:bf:ec:91:6d:c6:b3:57: 10:77:8b:f2:78:b7:3a:88:a4:2e:6f:a5:e1:1f:11:a2 Fingerprint (MD5): 9F:43:B5:4F:EC:AA:60:BF:29:86:5B:83:08:87:F3:29 Fingerprint (SHA1): 6E:F0:17:16:3E:58:05:1E:A4:93:2B:A3:A1:58:E0:C3:12:1F:D2:65 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1458: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174463 (0x137106ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 26 21:44:56 2012 Not After : Sun Mar 26 21:44:56 2062 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:9c:96:2d:b1:02:e2:b5:73:35:19:61:31:9b:27:59: 68:b7:05:f3:67:7d:22:6a:fd:42:6d:c4:b8:a3:6f:39: ad:5c:16:cc:05:e3:4a:4c:9d:40:ab:ce:ca:1e:17:30: 3c:63:0b:41:9d:f0:3c:9e:d9:db:5f:c4:c2:21:bb:b1: fb:92:29:72:36:9f:2a:ed:2e:76:b8:30:c7:de:2e:55: a9:80:78:b4:ff:ea:94:a9:f3:62:2a:3b:32:fa:b5:3c: 3a:8e:81:53:55:de:ab:27:a3:58:94:f9:2c:8f:02:92: 0b:3c:f6:d2:64:d2:97:cb:75:4c:1f:3f:49:c9:7a:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 45:5d:2e:37:17:4e:6b:04:bf:15:af:43:e1:65:41:95: f7:e9:c5:87:44:ed:7a:a9:c7:af:ca:23:de:77:b8:7c: d5:51:49:48:63:cf:20:ea:a5:f1:d5:13:46:8d:61:69: e7:c5:83:17:5d:d1:62:26:6b:fe:9a:67:a2:7a:ee:6e: 2e:28:b3:ad:64:40:89:63:4e:ed:18:b3:ed:9b:48:38: 73:b4:f5:e7:bd:8b:bb:dc:25:b2:42:76:36:a8:25:93: 4a:06:9c:0e:7d:9f:03:1c:06:c2:27:76:c4:16:7c:c4: d1:47:b9:8c:a2:27:0f:f9:f5:25:54:8d:36:0a:dd:f3 Fingerprint (MD5): 21:D5:8F:18:6D:7C:CF:EF:D3:E7:78:23:C7:27:A3:AB Fingerprint (SHA1): 2F:12:A2:23:DD:E8:67:93:A3:07:79:14:E2:2C:8A:69:23:C2:42:7B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1459: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174464 (0x13710700) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 26 21:44:56 2012 Not After : Sun Mar 26 21:44:56 2062 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:95:a9:34:61:01:3a:94:14:eb:df:ae:88:17:53:42: 20:f6:57:0d:d6:05:7a:55:c2:c3:66:72:1f:ad:2e:d4: 36:27:af:b2:ea:69:a0:5f:d1:94:cb:65:2a:f4:e6:0a: bc:d9:ff:90:8e:40:aa:50:09:d2:67:4a:34:c8:d8:5c: b1:60:9e:ac:f7:14:ac:3c:e4:f9:58:fe:be:e2:f5:ae: 91:7d:8b:2b:cf:24:aa:14:0a:dc:06:68:6b:93:5b:03: c4:bb:96:ad:ca:16:a0:3a:02:35:9f:f1:c7:1d:71:f4: 8c:e6:30:35:7e:99:8f:0c:e1:16:8c:78:99:06:3f:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 68:b1:89:7a:71:3b:da:a3:dd:70:55:c6:50:30:b6:c2: 44:cd:fc:1e:fc:8e:39:95:93:c6:4b:9d:5a:43:ee:17: 2b:20:d4:70:71:38:0e:f1:bd:e7:48:52:89:e2:f9:c9: d6:79:49:de:fe:d8:9e:d8:78:7f:60:b3:66:d7:4c:7e: 3c:d2:bd:84:93:fc:59:85:4e:2e:d4:0a:99:8a:06:a9: 92:bd:38:cd:6f:96:f2:97:53:71:84:69:b8:3e:38:62: 68:0d:39:f7:e2:6a:d1:86:de:22:ee:3e:14:bb:54:0b: c3:0a:c0:0e:38:b4:fb:2f:29:7e:b1:97:0f:7e:eb:fb Fingerprint (MD5): 80:A9:99:89:3C:BE:F4:99:5A:74:DA:3D:A4:91:AB:38 Fingerprint (SHA1): E5:B3:96:04:B7:74:59:FF:C7:F6:60:CE:71:DD:DC:C2:3E:EF:9F:D3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1460: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174465 (0x13710701) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 26 21:44:56 2012 Not After : Sun Mar 26 21:44:56 2062 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:dc:fa:4a:26:a7:33:cc:30:a2:a0:a8:03:7f:b6:c0: 90:42:8b:78:67:74:ba:c7:a9:00:50:56:ac:93:ff:10: c2:2d:0f:c4:9f:ff:9d:26:6a:38:c3:a2:2b:61:fd:21: e9:2b:0d:b5:24:df:ba:29:41:84:30:52:2f:c4:6c:62: e0:1d:92:ef:b5:6c:02:81:59:07:b2:ea:c0:b0:17:01: 43:30:5d:24:2e:9c:eb:9c:25:c1:9c:b9:8f:ed:5e:06: 35:91:47:97:c4:9b:ee:b0:05:86:3b:cf:e4:26:0e:80: cb:ae:e5:72:ce:d2:e9:76:c2:9f:41:de:6e:a8:57:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d2:e6:21:2e:57:44:36:d1:e0:e5:e0:16:b4:ea:88:74: f0:b4:24:7d:cd:5f:e8:c5:22:b7:7a:ae:22:71:9b:eb: 5c:0d:4b:e7:76:9d:bb:87:d2:17:34:5f:d2:ff:41:f5: 2a:92:48:26:fc:49:18:72:a8:f8:b4:36:26:00:eb:c5: cc:56:39:58:1f:22:09:26:24:01:c2:68:80:a0:27:44: 18:f5:97:72:05:65:8d:15:cb:b0:61:75:91:70:c3:6f: 20:31:d1:aa:22:bb:11:77:54:ad:be:16:68:1d:ac:6f: b4:04:89:31:a5:4f:b3:f9:98:a1:6a:84:a0:93:8d:02 Fingerprint (MD5): BD:A2:31:30:3B:D2:71:1D:4A:BE:F6:56:60:85:70:CD Fingerprint (SHA1): 82:CA:B0:C6:06:D3:F3:AD:11:48:53:D0:C2:97:79:64:29:9A:12:28 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1461: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174466 (0x13710702) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 26 21:44:56 2012 Not After : Sun Mar 26 21:44:56 2062 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:18:a2:d5:98:9d:33:c7:fc:a6:74:0a:c1:98:a0:4c: 1c:d6:5e:f7:aa:d1:8b:fb:0b:cb:99:99:4f:f9:da:cb: 87:a4:a0:86:ff:68:26:51:26:88:f5:4c:53:cd:75:f6: 11:78:50:34:b3:2c:8d:76:e9:15:d9:94:6b:15:13:3f: 4c:4c:df:50:62:f9:87:76:88:f9:d8:12:5c:fa:bd:2a: 85:4a:46:18:02:4f:97:3e:e5:f2:10:66:d7:f6:bc:4d: 0d:87:f9:a3:16:85:e4:e8:cb:c2:37:1f:ab:62:f0:72: 9a:ec:3a:81:11:43:93:1e:83:8f:0e:e0:6c:04:a2:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bd:c9:b0:20:cf:13:6d:b9:0a:02:b6:73:81:8f:eb:d6: 25:5c:ad:f0:06:ac:dd:26:f1:67:3c:99:b9:99:95:03: 37:03:b0:cf:33:14:eb:78:28:4a:a1:56:08:a1:c0:bf: 36:2a:e9:94:42:78:38:a6:12:e6:94:ee:98:08:64:70: ef:d9:77:32:20:94:1e:bb:2c:6f:17:54:08:4b:39:d7: 24:f3:33:0c:d9:62:94:87:df:a9:5a:55:a2:14:0b:65: d6:8f:59:c2:eb:86:72:6a:28:f4:78:67:be:65:13:1f: 3b:e1:34:8d:52:6f:98:10:27:3d:d8:16:88:55:12:9b Fingerprint (MD5): 4B:29:45:82:B9:78:B4:60:C8:71:DD:21:E8:9E:EC:CC Fingerprint (SHA1): BB:4B:BC:7C:16:9A:64:42:F4:94:A8:03:67:80:46:C2:B0:78:C6:02 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1462: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1463: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174481 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1464: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1465: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1466: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1467: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174482 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1468: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1469: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1470: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1471: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174483 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1472: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1473: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1474: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1475: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174484 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1476: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #1477: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1478: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174481 (0x13710711) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:44:59 2012 Not After : Sun Mar 26 21:44:59 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:ff:b8:ac:45:e7:47:3a:39:b9:42:aa:ea:bd:7f:40: 17:4d:2b:a8:b9:99:cd:fc:69:6f:0e:75:d0:31:4a:25: 6a:e7:79:44:f4:75:6b:35:44:0c:a1:1e:7f:c3:c9:f0: a4:05:89:09:33:f4:6e:17:dd:c7:8b:19:54:f4:1a:c5: e0:15:d4:72:65:2e:0c:81:b1:c2:72:09:89:8f:59:24: ed:33:e6:de:2f:d6:37:3a:5a:ae:fa:05:2b:51:d2:12: f3:3c:a0:60:59:bd:17:03:e4:f4:cd:aa:ed:ee:53:2b: 11:61:49:13:0b:c6:bf:02:4c:24:b1:45:db:61:f6:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7f:00:29:30:51:ff:c7:90:be:be:dc:85:ad:52:27:5e: 28:44:18:83:65:f9:f8:ee:73:58:af:97:41:91:b5:c1: 59:62:99:d0:da:a5:56:ba:44:9a:08:5d:eb:df:13:0c: 4a:94:31:ea:b8:8b:19:9e:bd:4d:3e:ea:23:bd:7d:03: 9d:96:77:ca:22:b1:da:bf:fb:00:e5:a5:18:e4:c6:b5: d5:0b:f8:f6:95:13:ae:c7:05:f4:e9:a5:04:18:72:cb: f5:f7:09:e3:96:a9:44:0c:76:52:39:b2:d6:81:cb:87: 7a:63:fb:28:73:e8:cb:4c:35:bc:2b:d4:89:70:e8:ef Fingerprint (MD5): EC:60:D1:E9:AD:95:60:02:D6:62:B5:94:52:E8:F1:BA Fingerprint (SHA1): 9C:02:CD:BE:51:01:EC:36:EF:44:7A:C0:92:67:E7:37:D6:C4:49:4F Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1479: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1480: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174482 (0x13710712) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:00 2012 Not After : Sun Mar 26 21:45:00 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:de:4d:04:5d:e1:93:cb:17:62:5c:40:2b:93:d3:ff: cb:72:c8:81:83:62:6c:7a:8d:1f:1f:fa:86:63:fd:76: a1:d0:c7:f4:c0:d9:0d:97:36:a9:15:fc:26:14:e1:0e: 0a:36:63:1b:75:d2:2e:cc:fd:c8:a3:b6:dc:eb:7d:e3: 63:4f:af:a7:a8:1b:d3:d0:e6:9d:ce:13:fe:1d:90:ee: 69:67:8d:18:e4:1a:87:e6:e2:74:12:ab:d7:ab:f9:dd: 47:43:43:94:24:1e:b9:40:9d:f1:f8:d1:b8:39:91:ea: 00:62:95:76:6d:46:af:b0:9f:59:37:07:5e:2f:c1:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 55:ca:a9:e6:79:83:9b:49:89:99:1e:ed:fb:ff:93:c5: 21:ee:96:3c:71:4d:36:b7:46:e1:3e:f8:7f:26:04:78: e2:3c:b0:bf:84:7c:be:70:2e:2f:92:58:86:65:c9:09: e7:aa:2e:17:d4:9f:0b:0c:37:c8:70:29:49:52:61:85: e0:f5:08:5c:08:0c:3d:12:fb:39:5f:79:70:bf:0f:29: 4c:1d:e2:76:19:eb:46:e9:a5:db:a3:e7:ff:cd:fe:2b: ce:fa:84:fa:5c:0e:6a:13:2c:7c:dc:44:d6:91:8c:f1: 7e:b4:89:29:70:96:22:1b:aa:5b:a7:80:f4:12:3b:34 Fingerprint (MD5): 57:DD:1B:07:CD:66:AA:18:0A:2D:A1:10:3F:CB:22:E8 Fingerprint (SHA1): AF:24:BE:33:E2:FC:F1:08:77:AF:96:E9:24:59:19:A0:B0:C5:36:D3 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1481: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1482: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174483 (0x13710713) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:45:00 2012 Not After : Sun Mar 26 21:45:00 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:44:2d:fb:1d:e1:b6:9b:37:f8:20:ef:59:ea:c6:18: cc:b4:fd:8e:e7:05:5c:36:1b:e0:32:0e:e5:b8:f5:0e: 85:0f:11:34:b5:b2:a9:a9:0e:d0:92:3f:78:30:e7:c5: 8a:eb:89:b8:20:45:ec:f5:cf:6a:3d:d9:d1:bd:ff:af: b4:bd:70:08:ac:16:02:0a:ff:f1:71:7f:9b:b8:55:16: 7b:21:c1:78:fc:73:a4:3e:5e:1e:3f:99:d5:cc:92:02: 35:ca:6c:2d:69:57:83:85:e6:36:0b:17:28:b0:4a:c2: e0:26:2e:bd:de:d7:b2:a3:70:d5:61:87:2e:51:c4:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d4:36:5a:c1:83:e3:74:67:93:6b:d7:e7:69:33:91:d0: ac:fe:fd:32:78:70:ae:55:ab:c6:d7:a9:15:e0:b8:1f: f2:5a:d1:81:d6:4c:94:03:f2:24:17:e8:d4:00:d3:48: ea:53:a0:5a:c8:48:7f:a4:cf:7a:e1:6b:09:5a:06:3e: c0:ed:57:b2:67:f3:3e:97:58:01:e8:ea:72:66:69:00: 31:d4:06:25:36:fa:ea:09:f0:03:8d:e6:30:1f:52:5d: 39:2c:63:84:89:54:1a:19:23:fb:41:98:26:9a:98:04: 5f:ee:93:42:4e:00:5b:53:3e:31:66:2d:a7:75:e3:ab Fingerprint (MD5): 17:82:08:CE:E0:7B:95:27:4E:7F:70:D4:B3:8D:89:58 Fingerprint (SHA1): 33:2A:8E:48:15:20:84:FE:B8:98:A5:C1:49:7D:68:8E:26:4E:15:6B Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1483: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1484: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1485: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1486: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1487: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174481 (0x13710711) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:44:59 2012 Not After : Sun Mar 26 21:44:59 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:ff:b8:ac:45:e7:47:3a:39:b9:42:aa:ea:bd:7f:40: 17:4d:2b:a8:b9:99:cd:fc:69:6f:0e:75:d0:31:4a:25: 6a:e7:79:44:f4:75:6b:35:44:0c:a1:1e:7f:c3:c9:f0: a4:05:89:09:33:f4:6e:17:dd:c7:8b:19:54:f4:1a:c5: e0:15:d4:72:65:2e:0c:81:b1:c2:72:09:89:8f:59:24: ed:33:e6:de:2f:d6:37:3a:5a:ae:fa:05:2b:51:d2:12: f3:3c:a0:60:59:bd:17:03:e4:f4:cd:aa:ed:ee:53:2b: 11:61:49:13:0b:c6:bf:02:4c:24:b1:45:db:61:f6:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7f:00:29:30:51:ff:c7:90:be:be:dc:85:ad:52:27:5e: 28:44:18:83:65:f9:f8:ee:73:58:af:97:41:91:b5:c1: 59:62:99:d0:da:a5:56:ba:44:9a:08:5d:eb:df:13:0c: 4a:94:31:ea:b8:8b:19:9e:bd:4d:3e:ea:23:bd:7d:03: 9d:96:77:ca:22:b1:da:bf:fb:00:e5:a5:18:e4:c6:b5: d5:0b:f8:f6:95:13:ae:c7:05:f4:e9:a5:04:18:72:cb: f5:f7:09:e3:96:a9:44:0c:76:52:39:b2:d6:81:cb:87: 7a:63:fb:28:73:e8:cb:4c:35:bc:2b:d4:89:70:e8:ef Fingerprint (MD5): EC:60:D1:E9:AD:95:60:02:D6:62:B5:94:52:E8:F1:BA Fingerprint (SHA1): 9C:02:CD:BE:51:01:EC:36:EF:44:7A:C0:92:67:E7:37:D6:C4:49:4F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1488: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1489: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174482 (0x13710712) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:00 2012 Not After : Sun Mar 26 21:45:00 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:de:4d:04:5d:e1:93:cb:17:62:5c:40:2b:93:d3:ff: cb:72:c8:81:83:62:6c:7a:8d:1f:1f:fa:86:63:fd:76: a1:d0:c7:f4:c0:d9:0d:97:36:a9:15:fc:26:14:e1:0e: 0a:36:63:1b:75:d2:2e:cc:fd:c8:a3:b6:dc:eb:7d:e3: 63:4f:af:a7:a8:1b:d3:d0:e6:9d:ce:13:fe:1d:90:ee: 69:67:8d:18:e4:1a:87:e6:e2:74:12:ab:d7:ab:f9:dd: 47:43:43:94:24:1e:b9:40:9d:f1:f8:d1:b8:39:91:ea: 00:62:95:76:6d:46:af:b0:9f:59:37:07:5e:2f:c1:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 55:ca:a9:e6:79:83:9b:49:89:99:1e:ed:fb:ff:93:c5: 21:ee:96:3c:71:4d:36:b7:46:e1:3e:f8:7f:26:04:78: e2:3c:b0:bf:84:7c:be:70:2e:2f:92:58:86:65:c9:09: e7:aa:2e:17:d4:9f:0b:0c:37:c8:70:29:49:52:61:85: e0:f5:08:5c:08:0c:3d:12:fb:39:5f:79:70:bf:0f:29: 4c:1d:e2:76:19:eb:46:e9:a5:db:a3:e7:ff:cd:fe:2b: ce:fa:84:fa:5c:0e:6a:13:2c:7c:dc:44:d6:91:8c:f1: 7e:b4:89:29:70:96:22:1b:aa:5b:a7:80:f4:12:3b:34 Fingerprint (MD5): 57:DD:1B:07:CD:66:AA:18:0A:2D:A1:10:3F:CB:22:E8 Fingerprint (SHA1): AF:24:BE:33:E2:FC:F1:08:77:AF:96:E9:24:59:19:A0:B0:C5:36:D3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174483 (0x13710713) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:45:00 2012 Not After : Sun Mar 26 21:45:00 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:44:2d:fb:1d:e1:b6:9b:37:f8:20:ef:59:ea:c6:18: cc:b4:fd:8e:e7:05:5c:36:1b:e0:32:0e:e5:b8:f5:0e: 85:0f:11:34:b5:b2:a9:a9:0e:d0:92:3f:78:30:e7:c5: 8a:eb:89:b8:20:45:ec:f5:cf:6a:3d:d9:d1:bd:ff:af: b4:bd:70:08:ac:16:02:0a:ff:f1:71:7f:9b:b8:55:16: 7b:21:c1:78:fc:73:a4:3e:5e:1e:3f:99:d5:cc:92:02: 35:ca:6c:2d:69:57:83:85:e6:36:0b:17:28:b0:4a:c2: e0:26:2e:bd:de:d7:b2:a3:70:d5:61:87:2e:51:c4:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d4:36:5a:c1:83:e3:74:67:93:6b:d7:e7:69:33:91:d0: ac:fe:fd:32:78:70:ae:55:ab:c6:d7:a9:15:e0:b8:1f: f2:5a:d1:81:d6:4c:94:03:f2:24:17:e8:d4:00:d3:48: ea:53:a0:5a:c8:48:7f:a4:cf:7a:e1:6b:09:5a:06:3e: c0:ed:57:b2:67:f3:3e:97:58:01:e8:ea:72:66:69:00: 31:d4:06:25:36:fa:ea:09:f0:03:8d:e6:30:1f:52:5d: 39:2c:63:84:89:54:1a:19:23:fb:41:98:26:9a:98:04: 5f:ee:93:42:4e:00:5b:53:3e:31:66:2d:a7:75:e3:ab Fingerprint (MD5): 17:82:08:CE:E0:7B:95:27:4E:7F:70:D4:B3:8D:89:58 Fingerprint (SHA1): 33:2A:8E:48:15:20:84:FE:B8:98:A5:C1:49:7D:68:8E:26:4E:15:6B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1494: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174485 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1495: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1496: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1497: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1498: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174486 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1499: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1500: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1501: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1502: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174487 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1503: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1504: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1505: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1506: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326174488 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1507: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #1508: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1509: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1510: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326174489 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1511: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #1512: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1513: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174485 (0x13710715) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:01 2012 Not After : Sun Mar 26 21:45:01 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:10:67:e7:01:2a:a2:b7:b7:0f:b5:3b:c2:0e:46:9a: 1e:98:89:63:6e:d7:64:0e:ef:92:22:1e:83:59:3e:e4: 27:a1:9f:58:e4:dd:0a:f8:7b:4c:b7:8f:41:d6:c5:cf: f8:f0:c1:7d:cc:8a:6e:ef:07:5f:b8:46:ee:cd:94:bc: 9b:30:f5:d6:3b:3c:77:43:2e:35:d2:e2:88:e6:96:72: f7:08:7c:97:a6:f9:ef:2a:cd:da:63:30:c2:28:34:78: bc:f1:c4:28:5f:b5:6f:29:87:7d:d7:2e:ab:1e:26:00: 65:7d:20:5c:6a:29:76:ca:dd:5e:e7:c0:c5:1f:cd:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c5:c7:d8:28:42:b9:4c:ee:80:95:c7:25:5f:29:05:95: 9e:76:29:bd:00:92:06:be:6d:dd:cd:ff:53:9c:ac:18: fd:58:08:5a:8a:aa:2f:73:2c:27:d9:68:99:b2:de:9c: 7a:aa:7c:94:b9:02:7c:2a:65:e7:25:21:ae:f9:51:ec: 0e:6e:01:5e:37:7a:11:ba:42:b3:aa:6a:cd:01:3f:4b: 70:c6:3d:38:ac:f0:a9:b4:38:18:22:28:8e:18:6d:44: 27:e1:67:13:1b:63:93:0d:2c:87:28:64:02:a0:83:76: f3:2f:ae:6a:a2:ef:ef:9c:d9:0b:83:97:25:fe:45:e7 Fingerprint (MD5): F5:7F:5E:F2:17:F0:DE:49:AC:04:BA:79:79:99:E6:DB Fingerprint (SHA1): A0:29:6E:6C:56:A5:39:40:22:AE:83:8C:7B:42:6D:43:96:6B:D8:C4 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1514: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1515: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174486 (0x13710716) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:01 2012 Not After : Sun Mar 26 21:45:01 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:14:65:c0:12:1e:38:0b:cb:cc:c4:bf:5c:81:64:91: 3d:8e:6e:b9:14:11:39:a2:e5:ca:92:3a:b1:da:88:04: af:94:0e:9f:62:d1:3d:cb:e2:9c:b7:bf:70:f7:91:52: d6:64:ff:b2:45:95:a6:63:c1:74:82:a8:5a:f0:94:dd: a6:26:3b:64:35:44:90:8b:5b:f7:ee:cc:ee:62:91:ed: 95:9f:d3:c7:6a:d6:c9:c9:74:5f:03:2f:0e:a5:d3:0c: ad:9b:31:1b:88:d6:6c:de:36:dc:5b:12:da:79:7a:d0: 17:5c:55:83:18:4e:25:28:df:39:a9:fd:a3:a1:f2:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:6d:91:d8:81:77:d0:f8:c5:99:7d:e3:d9:01:3e:da: ae:6f:d7:d6:bd:d1:68:77:95:a4:44:8a:19:12:e9:a3: 83:11:0c:57:83:ba:2d:7d:e6:b5:af:41:07:9e:09:0d: 58:06:56:42:e4:56:ce:3b:f9:99:e9:64:10:db:33:35: 0e:80:17:57:fc:e3:7f:31:d3:fb:4b:dc:fe:39:58:98: 88:1d:cb:e5:79:84:c4:5d:44:73:a4:0e:6e:ce:ef:42: ed:69:dd:0a:0e:dd:e3:35:e1:53:55:19:66:34:7a:1b: ac:38:44:f2:4c:4d:5d:d2:7c:f4:4c:1f:07:ec:64:d0 Fingerprint (MD5): 08:F5:A2:54:E0:C9:CF:EE:93:17:5F:23:61:0A:83:D1 Fingerprint (SHA1): 88:9A:AA:52:44:13:06:D6:8F:93:FF:33:0D:6F:DB:9E:EA:3E:84:58 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1516: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1517: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174487 (0x13710717) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:45:02 2012 Not After : Sun Mar 26 21:45:02 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:7b:bf:c8:91:47:1e:0c:cf:d8:29:8d:1c:2f:ee:29: a3:41:72:15:eb:ba:55:fd:e8:ba:a2:b4:7b:62:ef:5f: 0a:2c:42:cd:76:3f:1b:35:e4:9e:55:4d:91:c9:a3:17: bc:f6:5c:6d:94:a2:40:2a:c0:3f:65:f0:c5:c5:9d:b8: 48:2e:fc:8b:43:b8:3f:0a:3c:75:48:ea:5b:30:b6:98: fa:eb:7b:2a:fa:44:61:c8:29:5a:2b:a0:d5:94:45:05: fc:38:42:3b:a2:46:3d:91:f7:d2:e5:88:d5:82:6c:3d: ec:36:39:34:3a:08:99:a3:0f:ec:3d:af:8e:f3:ca:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 85:d8:69:f1:53:0d:81:5d:39:44:6d:3a:88:b9:90:43: 45:49:7b:87:fc:78:b1:df:07:fa:19:73:a6:e5:00:96: 46:5c:94:c5:da:f0:5f:ed:a0:c3:1b:40:60:f3:c5:45: 85:a4:89:57:2f:c5:fb:55:6f:a1:aa:47:3a:1f:b6:7f: 57:65:61:0b:4d:d3:6b:c9:f9:71:13:13:98:52:7a:b1: 83:78:82:53:2b:9b:7c:fb:4e:39:fb:ab:44:89:2b:1f: 4e:0b:5d:31:61:a3:8a:bd:06:db:98:9b:20:bd:ef:07: a3:56:84:ab:2a:c9:5b:18:10:3e:72:44:f0:9f:63:25 Fingerprint (MD5): 62:F2:DD:60:8B:40:C3:EA:34:B0:BE:C3:2F:C9:CD:CB Fingerprint (SHA1): C5:A7:C8:B4:4E:33:A0:6E:BA:F6:A6:CF:DE:27:5A:A7:FA:C5:33:86 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1518: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1519: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1520: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1521: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1522: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174485 (0x13710715) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:01 2012 Not After : Sun Mar 26 21:45:01 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:10:67:e7:01:2a:a2:b7:b7:0f:b5:3b:c2:0e:46:9a: 1e:98:89:63:6e:d7:64:0e:ef:92:22:1e:83:59:3e:e4: 27:a1:9f:58:e4:dd:0a:f8:7b:4c:b7:8f:41:d6:c5:cf: f8:f0:c1:7d:cc:8a:6e:ef:07:5f:b8:46:ee:cd:94:bc: 9b:30:f5:d6:3b:3c:77:43:2e:35:d2:e2:88:e6:96:72: f7:08:7c:97:a6:f9:ef:2a:cd:da:63:30:c2:28:34:78: bc:f1:c4:28:5f:b5:6f:29:87:7d:d7:2e:ab:1e:26:00: 65:7d:20:5c:6a:29:76:ca:dd:5e:e7:c0:c5:1f:cd:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c5:c7:d8:28:42:b9:4c:ee:80:95:c7:25:5f:29:05:95: 9e:76:29:bd:00:92:06:be:6d:dd:cd:ff:53:9c:ac:18: fd:58:08:5a:8a:aa:2f:73:2c:27:d9:68:99:b2:de:9c: 7a:aa:7c:94:b9:02:7c:2a:65:e7:25:21:ae:f9:51:ec: 0e:6e:01:5e:37:7a:11:ba:42:b3:aa:6a:cd:01:3f:4b: 70:c6:3d:38:ac:f0:a9:b4:38:18:22:28:8e:18:6d:44: 27:e1:67:13:1b:63:93:0d:2c:87:28:64:02:a0:83:76: f3:2f:ae:6a:a2:ef:ef:9c:d9:0b:83:97:25:fe:45:e7 Fingerprint (MD5): F5:7F:5E:F2:17:F0:DE:49:AC:04:BA:79:79:99:E6:DB Fingerprint (SHA1): A0:29:6E:6C:56:A5:39:40:22:AE:83:8C:7B:42:6D:43:96:6B:D8:C4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1523: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1524: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174486 (0x13710716) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:01 2012 Not After : Sun Mar 26 21:45:01 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:14:65:c0:12:1e:38:0b:cb:cc:c4:bf:5c:81:64:91: 3d:8e:6e:b9:14:11:39:a2:e5:ca:92:3a:b1:da:88:04: af:94:0e:9f:62:d1:3d:cb:e2:9c:b7:bf:70:f7:91:52: d6:64:ff:b2:45:95:a6:63:c1:74:82:a8:5a:f0:94:dd: a6:26:3b:64:35:44:90:8b:5b:f7:ee:cc:ee:62:91:ed: 95:9f:d3:c7:6a:d6:c9:c9:74:5f:03:2f:0e:a5:d3:0c: ad:9b:31:1b:88:d6:6c:de:36:dc:5b:12:da:79:7a:d0: 17:5c:55:83:18:4e:25:28:df:39:a9:fd:a3:a1:f2:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:6d:91:d8:81:77:d0:f8:c5:99:7d:e3:d9:01:3e:da: ae:6f:d7:d6:bd:d1:68:77:95:a4:44:8a:19:12:e9:a3: 83:11:0c:57:83:ba:2d:7d:e6:b5:af:41:07:9e:09:0d: 58:06:56:42:e4:56:ce:3b:f9:99:e9:64:10:db:33:35: 0e:80:17:57:fc:e3:7f:31:d3:fb:4b:dc:fe:39:58:98: 88:1d:cb:e5:79:84:c4:5d:44:73:a4:0e:6e:ce:ef:42: ed:69:dd:0a:0e:dd:e3:35:e1:53:55:19:66:34:7a:1b: ac:38:44:f2:4c:4d:5d:d2:7c:f4:4c:1f:07:ec:64:d0 Fingerprint (MD5): 08:F5:A2:54:E0:C9:CF:EE:93:17:5F:23:61:0A:83:D1 Fingerprint (SHA1): 88:9A:AA:52:44:13:06:D6:8F:93:FF:33:0D:6F:DB:9E:EA:3E:84:58 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1525: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1526: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174487 (0x13710717) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:45:02 2012 Not After : Sun Mar 26 21:45:02 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:7b:bf:c8:91:47:1e:0c:cf:d8:29:8d:1c:2f:ee:29: a3:41:72:15:eb:ba:55:fd:e8:ba:a2:b4:7b:62:ef:5f: 0a:2c:42:cd:76:3f:1b:35:e4:9e:55:4d:91:c9:a3:17: bc:f6:5c:6d:94:a2:40:2a:c0:3f:65:f0:c5:c5:9d:b8: 48:2e:fc:8b:43:b8:3f:0a:3c:75:48:ea:5b:30:b6:98: fa:eb:7b:2a:fa:44:61:c8:29:5a:2b:a0:d5:94:45:05: fc:38:42:3b:a2:46:3d:91:f7:d2:e5:88:d5:82:6c:3d: ec:36:39:34:3a:08:99:a3:0f:ec:3d:af:8e:f3:ca:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 85:d8:69:f1:53:0d:81:5d:39:44:6d:3a:88:b9:90:43: 45:49:7b:87:fc:78:b1:df:07:fa:19:73:a6:e5:00:96: 46:5c:94:c5:da:f0:5f:ed:a0:c3:1b:40:60:f3:c5:45: 85:a4:89:57:2f:c5:fb:55:6f:a1:aa:47:3a:1f:b6:7f: 57:65:61:0b:4d:d3:6b:c9:f9:71:13:13:98:52:7a:b1: 83:78:82:53:2b:9b:7c:fb:4e:39:fb:ab:44:89:2b:1f: 4e:0b:5d:31:61:a3:8a:bd:06:db:98:9b:20:bd:ef:07: a3:56:84:ab:2a:c9:5b:18:10:3e:72:44:f0:9f:63:25 Fingerprint (MD5): 62:F2:DD:60:8B:40:C3:EA:34:B0:BE:C3:2F:C9:CD:CB Fingerprint (SHA1): C5:A7:C8:B4:4E:33:A0:6E:BA:F6:A6:CF:DE:27:5A:A7:FA:C5:33:86 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1527: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1528: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174485 (0x13710715) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:01 2012 Not After : Sun Mar 26 21:45:01 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:10:67:e7:01:2a:a2:b7:b7:0f:b5:3b:c2:0e:46:9a: 1e:98:89:63:6e:d7:64:0e:ef:92:22:1e:83:59:3e:e4: 27:a1:9f:58:e4:dd:0a:f8:7b:4c:b7:8f:41:d6:c5:cf: f8:f0:c1:7d:cc:8a:6e:ef:07:5f:b8:46:ee:cd:94:bc: 9b:30:f5:d6:3b:3c:77:43:2e:35:d2:e2:88:e6:96:72: f7:08:7c:97:a6:f9:ef:2a:cd:da:63:30:c2:28:34:78: bc:f1:c4:28:5f:b5:6f:29:87:7d:d7:2e:ab:1e:26:00: 65:7d:20:5c:6a:29:76:ca:dd:5e:e7:c0:c5:1f:cd:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c5:c7:d8:28:42:b9:4c:ee:80:95:c7:25:5f:29:05:95: 9e:76:29:bd:00:92:06:be:6d:dd:cd:ff:53:9c:ac:18: fd:58:08:5a:8a:aa:2f:73:2c:27:d9:68:99:b2:de:9c: 7a:aa:7c:94:b9:02:7c:2a:65:e7:25:21:ae:f9:51:ec: 0e:6e:01:5e:37:7a:11:ba:42:b3:aa:6a:cd:01:3f:4b: 70:c6:3d:38:ac:f0:a9:b4:38:18:22:28:8e:18:6d:44: 27:e1:67:13:1b:63:93:0d:2c:87:28:64:02:a0:83:76: f3:2f:ae:6a:a2:ef:ef:9c:d9:0b:83:97:25:fe:45:e7 Fingerprint (MD5): F5:7F:5E:F2:17:F0:DE:49:AC:04:BA:79:79:99:E6:DB Fingerprint (SHA1): A0:29:6E:6C:56:A5:39:40:22:AE:83:8C:7B:42:6D:43:96:6B:D8:C4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1529: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174485 (0x13710715) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:01 2012 Not After : Sun Mar 26 21:45:01 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:10:67:e7:01:2a:a2:b7:b7:0f:b5:3b:c2:0e:46:9a: 1e:98:89:63:6e:d7:64:0e:ef:92:22:1e:83:59:3e:e4: 27:a1:9f:58:e4:dd:0a:f8:7b:4c:b7:8f:41:d6:c5:cf: f8:f0:c1:7d:cc:8a:6e:ef:07:5f:b8:46:ee:cd:94:bc: 9b:30:f5:d6:3b:3c:77:43:2e:35:d2:e2:88:e6:96:72: f7:08:7c:97:a6:f9:ef:2a:cd:da:63:30:c2:28:34:78: bc:f1:c4:28:5f:b5:6f:29:87:7d:d7:2e:ab:1e:26:00: 65:7d:20:5c:6a:29:76:ca:dd:5e:e7:c0:c5:1f:cd:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c5:c7:d8:28:42:b9:4c:ee:80:95:c7:25:5f:29:05:95: 9e:76:29:bd:00:92:06:be:6d:dd:cd:ff:53:9c:ac:18: fd:58:08:5a:8a:aa:2f:73:2c:27:d9:68:99:b2:de:9c: 7a:aa:7c:94:b9:02:7c:2a:65:e7:25:21:ae:f9:51:ec: 0e:6e:01:5e:37:7a:11:ba:42:b3:aa:6a:cd:01:3f:4b: 70:c6:3d:38:ac:f0:a9:b4:38:18:22:28:8e:18:6d:44: 27:e1:67:13:1b:63:93:0d:2c:87:28:64:02:a0:83:76: f3:2f:ae:6a:a2:ef:ef:9c:d9:0b:83:97:25:fe:45:e7 Fingerprint (MD5): F5:7F:5E:F2:17:F0:DE:49:AC:04:BA:79:79:99:E6:DB Fingerprint (SHA1): A0:29:6E:6C:56:A5:39:40:22:AE:83:8C:7B:42:6D:43:96:6B:D8:C4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1530: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174486 (0x13710716) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:01 2012 Not After : Sun Mar 26 21:45:01 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:14:65:c0:12:1e:38:0b:cb:cc:c4:bf:5c:81:64:91: 3d:8e:6e:b9:14:11:39:a2:e5:ca:92:3a:b1:da:88:04: af:94:0e:9f:62:d1:3d:cb:e2:9c:b7:bf:70:f7:91:52: d6:64:ff:b2:45:95:a6:63:c1:74:82:a8:5a:f0:94:dd: a6:26:3b:64:35:44:90:8b:5b:f7:ee:cc:ee:62:91:ed: 95:9f:d3:c7:6a:d6:c9:c9:74:5f:03:2f:0e:a5:d3:0c: ad:9b:31:1b:88:d6:6c:de:36:dc:5b:12:da:79:7a:d0: 17:5c:55:83:18:4e:25:28:df:39:a9:fd:a3:a1:f2:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:6d:91:d8:81:77:d0:f8:c5:99:7d:e3:d9:01:3e:da: ae:6f:d7:d6:bd:d1:68:77:95:a4:44:8a:19:12:e9:a3: 83:11:0c:57:83:ba:2d:7d:e6:b5:af:41:07:9e:09:0d: 58:06:56:42:e4:56:ce:3b:f9:99:e9:64:10:db:33:35: 0e:80:17:57:fc:e3:7f:31:d3:fb:4b:dc:fe:39:58:98: 88:1d:cb:e5:79:84:c4:5d:44:73:a4:0e:6e:ce:ef:42: ed:69:dd:0a:0e:dd:e3:35:e1:53:55:19:66:34:7a:1b: ac:38:44:f2:4c:4d:5d:d2:7c:f4:4c:1f:07:ec:64:d0 Fingerprint (MD5): 08:F5:A2:54:E0:C9:CF:EE:93:17:5F:23:61:0A:83:D1 Fingerprint (SHA1): 88:9A:AA:52:44:13:06:D6:8F:93:FF:33:0D:6F:DB:9E:EA:3E:84:58 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1531: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174486 (0x13710716) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:01 2012 Not After : Sun Mar 26 21:45:01 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:14:65:c0:12:1e:38:0b:cb:cc:c4:bf:5c:81:64:91: 3d:8e:6e:b9:14:11:39:a2:e5:ca:92:3a:b1:da:88:04: af:94:0e:9f:62:d1:3d:cb:e2:9c:b7:bf:70:f7:91:52: d6:64:ff:b2:45:95:a6:63:c1:74:82:a8:5a:f0:94:dd: a6:26:3b:64:35:44:90:8b:5b:f7:ee:cc:ee:62:91:ed: 95:9f:d3:c7:6a:d6:c9:c9:74:5f:03:2f:0e:a5:d3:0c: ad:9b:31:1b:88:d6:6c:de:36:dc:5b:12:da:79:7a:d0: 17:5c:55:83:18:4e:25:28:df:39:a9:fd:a3:a1:f2:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:6d:91:d8:81:77:d0:f8:c5:99:7d:e3:d9:01:3e:da: ae:6f:d7:d6:bd:d1:68:77:95:a4:44:8a:19:12:e9:a3: 83:11:0c:57:83:ba:2d:7d:e6:b5:af:41:07:9e:09:0d: 58:06:56:42:e4:56:ce:3b:f9:99:e9:64:10:db:33:35: 0e:80:17:57:fc:e3:7f:31:d3:fb:4b:dc:fe:39:58:98: 88:1d:cb:e5:79:84:c4:5d:44:73:a4:0e:6e:ce:ef:42: ed:69:dd:0a:0e:dd:e3:35:e1:53:55:19:66:34:7a:1b: ac:38:44:f2:4c:4d:5d:d2:7c:f4:4c:1f:07:ec:64:d0 Fingerprint (MD5): 08:F5:A2:54:E0:C9:CF:EE:93:17:5F:23:61:0A:83:D1 Fingerprint (SHA1): 88:9A:AA:52:44:13:06:D6:8F:93:FF:33:0D:6F:DB:9E:EA:3E:84:58 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1532: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174487 (0x13710717) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:45:02 2012 Not After : Sun Mar 26 21:45:02 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:7b:bf:c8:91:47:1e:0c:cf:d8:29:8d:1c:2f:ee:29: a3:41:72:15:eb:ba:55:fd:e8:ba:a2:b4:7b:62:ef:5f: 0a:2c:42:cd:76:3f:1b:35:e4:9e:55:4d:91:c9:a3:17: bc:f6:5c:6d:94:a2:40:2a:c0:3f:65:f0:c5:c5:9d:b8: 48:2e:fc:8b:43:b8:3f:0a:3c:75:48:ea:5b:30:b6:98: fa:eb:7b:2a:fa:44:61:c8:29:5a:2b:a0:d5:94:45:05: fc:38:42:3b:a2:46:3d:91:f7:d2:e5:88:d5:82:6c:3d: ec:36:39:34:3a:08:99:a3:0f:ec:3d:af:8e:f3:ca:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 85:d8:69:f1:53:0d:81:5d:39:44:6d:3a:88:b9:90:43: 45:49:7b:87:fc:78:b1:df:07:fa:19:73:a6:e5:00:96: 46:5c:94:c5:da:f0:5f:ed:a0:c3:1b:40:60:f3:c5:45: 85:a4:89:57:2f:c5:fb:55:6f:a1:aa:47:3a:1f:b6:7f: 57:65:61:0b:4d:d3:6b:c9:f9:71:13:13:98:52:7a:b1: 83:78:82:53:2b:9b:7c:fb:4e:39:fb:ab:44:89:2b:1f: 4e:0b:5d:31:61:a3:8a:bd:06:db:98:9b:20:bd:ef:07: a3:56:84:ab:2a:c9:5b:18:10:3e:72:44:f0:9f:63:25 Fingerprint (MD5): 62:F2:DD:60:8B:40:C3:EA:34:B0:BE:C3:2F:C9:CD:CB Fingerprint (SHA1): C5:A7:C8:B4:4E:33:A0:6E:BA:F6:A6:CF:DE:27:5A:A7:FA:C5:33:86 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1533: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174487 (0x13710717) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:45:02 2012 Not After : Sun Mar 26 21:45:02 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:7b:bf:c8:91:47:1e:0c:cf:d8:29:8d:1c:2f:ee:29: a3:41:72:15:eb:ba:55:fd:e8:ba:a2:b4:7b:62:ef:5f: 0a:2c:42:cd:76:3f:1b:35:e4:9e:55:4d:91:c9:a3:17: bc:f6:5c:6d:94:a2:40:2a:c0:3f:65:f0:c5:c5:9d:b8: 48:2e:fc:8b:43:b8:3f:0a:3c:75:48:ea:5b:30:b6:98: fa:eb:7b:2a:fa:44:61:c8:29:5a:2b:a0:d5:94:45:05: fc:38:42:3b:a2:46:3d:91:f7:d2:e5:88:d5:82:6c:3d: ec:36:39:34:3a:08:99:a3:0f:ec:3d:af:8e:f3:ca:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 85:d8:69:f1:53:0d:81:5d:39:44:6d:3a:88:b9:90:43: 45:49:7b:87:fc:78:b1:df:07:fa:19:73:a6:e5:00:96: 46:5c:94:c5:da:f0:5f:ed:a0:c3:1b:40:60:f3:c5:45: 85:a4:89:57:2f:c5:fb:55:6f:a1:aa:47:3a:1f:b6:7f: 57:65:61:0b:4d:d3:6b:c9:f9:71:13:13:98:52:7a:b1: 83:78:82:53:2b:9b:7c:fb:4e:39:fb:ab:44:89:2b:1f: 4e:0b:5d:31:61:a3:8a:bd:06:db:98:9b:20:bd:ef:07: a3:56:84:ab:2a:c9:5b:18:10:3e:72:44:f0:9f:63:25 Fingerprint (MD5): 62:F2:DD:60:8B:40:C3:EA:34:B0:BE:C3:2F:C9:CD:CB Fingerprint (SHA1): C5:A7:C8:B4:4E:33:A0:6E:BA:F6:A6:CF:DE:27:5A:A7:FA:C5:33:86 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1534: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1535: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174490 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1536: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1537: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1538: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1539: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326174491 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1540: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #1541: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1542: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1543: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174492 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1544: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1545: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1546: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1547: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 326174493 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1548: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der chains.sh: #1549: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1550: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1551: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326174494 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1552: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #1553: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1554: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1555: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326174495 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1556: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #1557: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1558: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1559: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 326174496 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1560: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der chains.sh: #1561: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1562: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1563: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1564: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1565: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1566: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174490 (0x1371071a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:04 2012 Not After : Sun Mar 26 21:45:04 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:94:43:6f:ef:9f:c3:a2:31:24:59:72:32:28:0a:62: e6:7c:d6:cf:c9:9b:5f:27:4e:4f:80:51:d2:89:b3:bf: 13:4e:dd:11:68:f0:bc:d6:7b:20:2e:15:70:08:46:6a: 36:f4:ed:53:0f:e9:c7:0b:51:8c:f3:31:0b:56:df:49: 92:e5:56:10:17:19:c8:8d:3e:d2:e9:a8:5e:37:78:32: e2:22:28:cf:71:65:c4:db:55:ab:29:2e:7f:d0:4e:24: e3:cd:03:94:19:e4:bf:c9:c8:4e:57:65:52:9b:9d:b1: ef:09:20:95:c1:15:bc:6c:c3:87:11:2f:d9:bd:2a:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8a:3c:c0:74:92:17:51:1f:ee:e2:9f:9f:df:4b:25:47: 40:e7:d8:2e:bf:31:84:07:7b:07:44:e0:9c:fb:0b:8e: 2a:6a:0d:0b:2f:96:47:fe:45:7a:dd:04:3a:ec:db:4e: b2:cf:13:65:eb:d6:7a:70:62:49:59:9a:f0:1e:5d:1a: 02:6f:7a:c5:11:75:95:36:3d:53:24:28:3d:e5:c1:48: 8e:7b:b0:36:a3:c1:03:a6:6b:06:15:ec:a0:db:55:4f: b8:be:b3:47:d8:ff:50:48:0b:c9:5d:1e:47:b9:41:fe: 6c:93:f5:ba:9f:bd:b7:0e:53:bb:36:90:fa:19:54:b8 Fingerprint (MD5): 40:02:5B:13:14:87:ED:BB:AB:DF:AF:EE:09:A7:3B:D4 Fingerprint (SHA1): D3:B2:F0:EE:00:A0:3C:E4:1A:3A:80:26:72:23:B8:53:6E:7C:6E:B9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1567: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1568: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1569: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1570: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174490 (0x1371071a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:04 2012 Not After : Sun Mar 26 21:45:04 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:94:43:6f:ef:9f:c3:a2:31:24:59:72:32:28:0a:62: e6:7c:d6:cf:c9:9b:5f:27:4e:4f:80:51:d2:89:b3:bf: 13:4e:dd:11:68:f0:bc:d6:7b:20:2e:15:70:08:46:6a: 36:f4:ed:53:0f:e9:c7:0b:51:8c:f3:31:0b:56:df:49: 92:e5:56:10:17:19:c8:8d:3e:d2:e9:a8:5e:37:78:32: e2:22:28:cf:71:65:c4:db:55:ab:29:2e:7f:d0:4e:24: e3:cd:03:94:19:e4:bf:c9:c8:4e:57:65:52:9b:9d:b1: ef:09:20:95:c1:15:bc:6c:c3:87:11:2f:d9:bd:2a:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8a:3c:c0:74:92:17:51:1f:ee:e2:9f:9f:df:4b:25:47: 40:e7:d8:2e:bf:31:84:07:7b:07:44:e0:9c:fb:0b:8e: 2a:6a:0d:0b:2f:96:47:fe:45:7a:dd:04:3a:ec:db:4e: b2:cf:13:65:eb:d6:7a:70:62:49:59:9a:f0:1e:5d:1a: 02:6f:7a:c5:11:75:95:36:3d:53:24:28:3d:e5:c1:48: 8e:7b:b0:36:a3:c1:03:a6:6b:06:15:ec:a0:db:55:4f: b8:be:b3:47:d8:ff:50:48:0b:c9:5d:1e:47:b9:41:fe: 6c:93:f5:ba:9f:bd:b7:0e:53:bb:36:90:fa:19:54:b8 Fingerprint (MD5): 40:02:5B:13:14:87:ED:BB:AB:DF:AF:EE:09:A7:3B:D4 Fingerprint (SHA1): D3:B2:F0:EE:00:A0:3C:E4:1A:3A:80:26:72:23:B8:53:6E:7C:6E:B9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1571: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1572: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1573: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174497 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1574: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1575: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1576: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1577: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326174498 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1578: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #1579: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1580: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1581: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 326174499 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1582: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der chains.sh: #1583: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1584: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1585: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 326174500 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1586: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der chains.sh: #1587: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1588: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1589: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 326174501 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1590: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der chains.sh: #1591: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1592: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1593: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 326174502 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1594: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der chains.sh: #1595: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1596: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 326174503 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der chains.sh: #1599: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1600: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1601: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 326174504 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der chains.sh: #1603: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1604: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 326174505 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1606: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der chains.sh: #1607: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1608: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 326174506 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der chains.sh: #1611: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1612: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1613: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 326174507 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1614: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der chains.sh: #1615: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1616: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1617: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 326174508 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1618: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der chains.sh: #1619: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1620: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1621: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 326174509 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1622: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der chains.sh: #1623: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1624: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1625: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 326174510 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1626: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der chains.sh: #1627: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1628: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1629: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 326174511 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1630: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der chains.sh: #1631: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1632: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1633: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 326174512 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1634: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der chains.sh: #1635: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1636: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1637: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 326174513 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1638: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der chains.sh: #1639: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1640: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1641: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 326174514 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1642: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der chains.sh: #1643: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1644: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1645: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 326174515 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1646: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der chains.sh: #1647: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1648: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1649: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 326174516 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1650: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der chains.sh: #1651: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1652: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1653: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 326174517 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1654: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der chains.sh: #1655: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1656: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1657: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 326174518 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1658: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der chains.sh: #1659: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1660: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1661: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 326174519 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1662: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der chains.sh: #1663: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1664: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1665: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 326174520 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1666: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der chains.sh: #1667: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1668: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1669: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 326174521 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1670: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der chains.sh: #1671: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1672: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1673: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 326174522 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1674: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der chains.sh: #1675: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1676: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1677: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 326174523 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1678: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der chains.sh: #1679: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1680: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1681: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 326174524 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1682: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der chains.sh: #1683: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1684: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1685: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 326174525 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1686: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der chains.sh: #1687: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1688: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1689: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 326174526 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1690: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der chains.sh: #1691: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1692: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1693: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1694: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1695: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1696: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1697: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1698: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1699: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1700: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1701: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1702: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1703: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1704: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1705: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1706: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1707: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1708: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1709: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1710: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1711: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1712: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1713: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1714: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174497 (0x13710721) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:45:06 2012 Not After : Sun Mar 26 21:45:06 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:8a:88:95:17:71:0b:4a:7e:8b:eb:ed:a5:77:3b:e5: 0b:16:b4:9a:0f:a1:31:3b:12:b5:32:45:95:40:c7:ad: eb:cf:85:bb:14:bd:13:ff:8e:63:58:a2:0a:c0:80:85: 87:d7:ae:20:c9:b3:36:62:94:88:af:31:e6:32:8f:98: c1:61:ec:ed:39:8f:d3:e4:13:bc:0a:83:3b:fd:90:36: 61:3f:da:af:43:6b:0e:96:1a:67:2f:4d:f4:11:ec:30: 7e:31:80:41:ff:10:ba:c4:6b:71:ad:57:15:0d:ca:1a: c3:be:ad:6c:be:b7:cf:5e:1b:15:e2:54:5d:31:c4:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:66:33:d6:36:80:1e:8c:1f:d1:2a:43:00:71:c5:8b: 68:ac:c8:69:eb:c8:ac:8d:73:b9:79:82:2e:cc:26:b0: ca:29:73:a0:01:24:e6:a4:b0:ff:19:61:82:dd:dc:65: f6:a8:b5:83:72:8b:58:8d:07:ae:7e:b1:28:40:6e:2b: b7:f8:67:aa:41:7e:dd:6a:82:a1:c0:d4:e4:05:47:2c: 82:34:7b:21:e8:67:67:49:c9:d5:a5:ba:64:f1:ab:3b: d6:3a:91:dd:04:13:4b:cd:ed:04:62:bd:81:0e:3a:c7: b6:ce:04:95:ed:b7:52:6e:a4:7f:8d:b5:21:9d:52:3d Fingerprint (MD5): D6:9D:41:83:BB:43:04:AC:D2:C4:38:9F:52:58:83:AC Fingerprint (SHA1): 91:0A:EA:10:0D:65:A6:A5:3B:09:AC:75:20:69:A0:49:7F:BB:6D:70 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1715: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1716: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1717: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174527 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1718: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1719: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1720: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1721: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 326174528 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1722: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der chains.sh: #1723: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1724: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1725: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 326174529 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1726: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der chains.sh: #1727: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1728: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1729: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 326174530 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1730: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der chains.sh: #1731: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1732: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1733: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 326174531 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der chains.sh: #1735: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1736: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1737: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 326174532 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der chains.sh: #1739: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1740: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1741: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 326174533 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der chains.sh: #1743: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1744: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174527 (0x1371073f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:14 2012 Not After : Sun Mar 26 21:45:14 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:0e:6b:78:25:d8:62:4a:83:02:76:74:8a:29:6a:f8: 17:80:49:31:34:b3:46:1e:26:82:b9:c7:4e:89:f2:f4: f7:05:32:f9:77:40:7c:49:6f:1f:a1:12:d5:69:d6:ed: 14:67:7e:75:aa:4e:86:bc:9e:16:f9:aa:97:0d:f5:0b: 6e:37:76:d0:7b:46:0e:b0:00:ff:e7:cd:44:b3:a7:56: d8:42:31:f7:3b:73:a3:19:2e:90:1a:50:a0:c6:70:15: a9:6f:32:31:7d:47:3a:05:22:53:ff:bc:be:33:57:bc: 10:95:11:4f:6a:a3:23:4d:01:03:16:dc:37:72:fa:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:1e:54:5e:be:00:32:12:a5:62:88:dd:ae:4a:b6:89: 6a:fc:e2:f7:2b:30:56:b0:6c:96:be:b2:87:58:94:e8: 7a:2b:78:be:cb:2b:32:11:9b:6d:22:48:8f:5c:1a:7a: 3b:5f:33:39:3f:1d:64:be:b3:68:f5:0a:3c:e2:e5:7a: 2e:7b:71:57:5d:4c:73:e3:d4:5d:e0:87:66:8a:b9:c8: e1:33:7c:21:7b:47:8f:eb:de:1c:65:67:81:c3:7d:df: 3d:1c:71:38:5e:56:94:12:cc:e8:b2:59:e5:7c:35:43: 50:d5:07:36:90:f7:b0:79:52:c7:9d:ea:b1:57:1b:37 Fingerprint (MD5): CA:F3:01:7B:19:72:9D:4B:C3:4E:86:C2:1C:E9:2D:1D Fingerprint (SHA1): DD:EC:57:2F:DF:BE:0F:71:AE:57:0D:A2:E3:02:4A:15:14:97:28:92 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1745: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1746: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1747: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1748: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174527 (0x1371073f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:14 2012 Not After : Sun Mar 26 21:45:14 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:0e:6b:78:25:d8:62:4a:83:02:76:74:8a:29:6a:f8: 17:80:49:31:34:b3:46:1e:26:82:b9:c7:4e:89:f2:f4: f7:05:32:f9:77:40:7c:49:6f:1f:a1:12:d5:69:d6:ed: 14:67:7e:75:aa:4e:86:bc:9e:16:f9:aa:97:0d:f5:0b: 6e:37:76:d0:7b:46:0e:b0:00:ff:e7:cd:44:b3:a7:56: d8:42:31:f7:3b:73:a3:19:2e:90:1a:50:a0:c6:70:15: a9:6f:32:31:7d:47:3a:05:22:53:ff:bc:be:33:57:bc: 10:95:11:4f:6a:a3:23:4d:01:03:16:dc:37:72:fa:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:1e:54:5e:be:00:32:12:a5:62:88:dd:ae:4a:b6:89: 6a:fc:e2:f7:2b:30:56:b0:6c:96:be:b2:87:58:94:e8: 7a:2b:78:be:cb:2b:32:11:9b:6d:22:48:8f:5c:1a:7a: 3b:5f:33:39:3f:1d:64:be:b3:68:f5:0a:3c:e2:e5:7a: 2e:7b:71:57:5d:4c:73:e3:d4:5d:e0:87:66:8a:b9:c8: e1:33:7c:21:7b:47:8f:eb:de:1c:65:67:81:c3:7d:df: 3d:1c:71:38:5e:56:94:12:cc:e8:b2:59:e5:7c:35:43: 50:d5:07:36:90:f7:b0:79:52:c7:9d:ea:b1:57:1b:37 Fingerprint (MD5): CA:F3:01:7B:19:72:9D:4B:C3:4E:86:C2:1C:E9:2D:1D Fingerprint (SHA1): DD:EC:57:2F:DF:BE:0F:71:AE:57:0D:A2:E3:02:4A:15:14:97:28:92 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1749: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1750: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1751: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1752: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174534 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1753: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1754: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1755: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1756: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174535 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1757: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1758: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1759: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1760: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174536 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1761: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1762: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1763: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1764: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174537 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1765: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #1766: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1767: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1768: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1769: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1770: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174534 (0x13710746) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:16 2012 Not After : Sun Mar 26 21:45:16 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f7:23:6e:9d:c6:7b:b2:83:7c:d4:06:34:27:82:fa:d1: ec:f0:89:89:1b:b2:72:39:c0:83:35:3a:ff:db:74:51: 13:36:95:4d:0a:dd:01:01:36:9d:27:9d:46:fc:2f:69: 87:ad:38:42:fe:fa:5c:b8:73:a8:b4:3f:1d:cb:45:cd: 0b:d6:6e:4d:55:0d:a2:4f:b2:06:38:b9:96:6e:30:b2: e9:50:08:85:d8:2d:fd:c4:72:85:d5:2c:cd:56:05:ea: 97:3a:3a:25:32:44:86:ac:be:58:7d:12:10:14:bb:5d: e5:61:1c:1b:e5:29:e0:59:46:e6:2c:eb:32:33:36:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ed:37:2e:09:88:27:62:88:a8:20:e5:b0:b9:ca:22:19: 4d:f2:8e:64:55:b6:bf:79:34:8d:e7:4a:fa:4d:2f:77: 52:45:16:dc:f5:06:69:1e:2c:94:af:23:e8:d4:64:82: f6:d7:f5:a9:89:0b:7d:32:a9:a2:ff:22:38:06:94:6f: c6:6f:73:67:a3:c9:75:cc:c8:95:b2:69:4c:28:7c:6f: 94:d5:06:93:55:3e:88:b8:6e:be:64:d1:7a:eb:a1:e3: 12:16:bf:ac:ca:cd:1d:cc:48:fa:a3:a7:f3:cc:a8:82: b0:43:12:6a:ca:1a:c5:74:31:d4:26:ce:80:d2:01:1f Fingerprint (MD5): C6:2E:C7:DA:69:52:21:7D:26:76:95:C1:A7:7B:9A:E4 Fingerprint (SHA1): 03:FB:61:BA:C3:14:65:09:6D:DA:2B:8E:8A:19:88:AE:77:5A:50:3E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1771: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1772: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1773: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174535 (0x13710747) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:17 2012 Not After : Sun Mar 26 21:45:17 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:06:e4:40:d7:4e:a5:00:b4:b6:15:23:41:c4:3f:7f: bc:d1:c5:60:c8:fa:2c:e7:97:48:0e:90:e3:1d:56:ea: ca:41:60:89:1d:7a:5b:a8:45:36:24:ca:2d:ad:c3:da: 57:f9:7c:a6:10:a1:0c:9c:fb:e4:e3:9f:fd:9d:a8:e2: e3:ab:9b:cc:ce:f8:0e:86:36:87:98:a8:15:d5:03:9b: c6:cb:42:88:f0:b1:f9:65:c9:df:99:f8:8a:96:d3:3b: 4d:a7:9e:4e:5d:20:46:36:c6:72:73:31:6b:4b:8b:51: 2d:6d:17:ff:0f:2c:c2:98:47:9b:16:e2:f2:5b:02:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d9:e2:ea:f8:40:1e:2c:3b:6c:97:7c:4f:0a:fa:af:c7: b1:9e:9e:f4:b4:a9:4b:6d:59:05:c5:b2:52:7e:53:86: 15:c5:57:ed:a2:90:4d:5a:22:40:6d:83:fa:af:6d:fe: c0:ec:2f:9b:d5:5e:27:2b:9e:fc:29:08:6c:3f:ce:fe: e5:26:c2:27:4a:59:12:1d:bb:49:35:08:77:de:91:03: 34:7c:c3:ca:b8:5b:bf:75:03:11:a4:fb:94:eb:81:d9: 0c:be:8d:73:1e:fe:c5:1c:6d:94:77:1b:11:64:3a:e3: 0a:78:22:76:9c:0e:93:b6:13:b3:0c:77:9f:75:dc:fc Fingerprint (MD5): A2:08:CC:81:5D:76:C0:59:70:79:29:EC:45:4A:3E:57 Fingerprint (SHA1): A6:36:42:76:88:A8:54:EC:5D:95:00:65:79:EA:87:09:6B:81:02:1F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1774: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1775: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174536 (0x13710748) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:45:17 2012 Not After : Sun Mar 26 21:45:17 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:49:7a:2f:02:24:40:5c:4a:89:34:a6:49:c2:b8:38: b0:b8:ba:37:f1:72:6a:27:54:c4:94:51:15:78:44:36: 24:93:e4:3d:b0:6d:57:ec:b7:6b:35:44:68:36:02:3d: 88:e3:78:38:f6:e4:88:f8:04:6b:f6:4a:1b:b7:b6:1d: d7:99:87:75:d8:b5:be:3c:b3:9e:a0:55:f5:bc:58:b1: bb:70:68:6f:2c:ff:2e:1b:5e:93:9b:1a:eb:88:9b:ff: 99:64:0b:30:78:29:f7:78:a6:d3:b3:b0:03:0c:16:f0: 51:f8:a0:b1:80:ef:fd:d0:aa:b7:a6:15:d5:74:04:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 48:46:64:af:1b:4b:97:75:a0:bb:f4:65:74:d0:e5:51: a7:11:61:04:29:f3:2d:ca:eb:00:02:c5:fa:62:44:81: be:61:61:ec:ea:c6:91:ee:70:09:7d:11:98:7e:2f:3a: 91:57:e1:7b:b8:56:d1:dd:95:1d:18:49:53:b0:36:5e: 9e:64:61:02:d9:23:08:ef:3c:28:04:09:f6:df:08:05: 08:f5:ba:e9:13:90:f8:7f:9f:89:f2:0f:a6:a6:b8:24: 9b:b5:39:bf:b0:5f:d4:af:22:b9:5d:07:41:f2:50:1c: ba:10:08:4d:5d:cf:73:c6:46:23:b6:79:7b:79:80:c7 Fingerprint (MD5): A6:7B:55:97:4C:FC:25:D2:54:E3:D7:20:1D:E7:70:57 Fingerprint (SHA1): CC:DF:14:1E:F2:2C:1E:3E:CB:D9:5D:F4:BF:2A:B5:D0:CC:B1:73:6C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1776: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1777: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174538 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1778: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1779: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1780: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1781: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174539 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1782: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1783: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1784: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1785: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174540 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1786: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1787: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1788: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 326174541 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1790: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der chains.sh: #1791: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1792: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1793: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 326174542 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1794: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der chains.sh: #1795: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1796: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1797: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1798: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1799: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1800: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174538 (0x1371074a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:18 2012 Not After : Sun Mar 26 21:45:18 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:eb:3e:44:b9:f8:46:0c:d2:14:2a:5a:8a:d9:bc:c4: cd:cb:5c:49:b3:07:a7:14:07:e5:6a:a6:3e:a1:8e:7e: cc:0a:e1:08:bf:bd:cd:65:66:ec:0c:f7:64:fb:37:5a: 5e:2a:f4:93:e0:ec:6e:46:95:c2:f5:0a:db:a2:7d:51: 0d:7b:2b:b1:7d:f4:d2:79:54:9c:fb:a3:3c:7e:11:83: 84:95:c7:bb:13:48:b0:4b:d6:3a:2f:96:da:98:c1:8e: 4f:03:c7:a4:ff:e0:b1:ef:4f:1a:63:16:7e:78:7c:9b: 4b:a3:96:9f:7e:ab:1f:42:ed:c3:4b:56:bc:f1:34:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0a:64:47:0e:98:13:09:91:25:88:d5:19:b5:29:7f:09: bd:46:6d:65:44:72:7c:6b:22:54:22:4d:dd:56:67:87: e8:99:68:c8:6c:67:3a:ce:97:a6:a4:66:50:9f:29:15: 0b:7c:55:51:de:5d:2b:f9:fe:67:a6:35:73:54:68:e3: ac:32:8a:ea:29:07:5e:9f:5a:13:b3:97:8e:73:bf:73: bf:f2:30:d9:bc:3e:6d:54:62:1a:06:b3:55:ae:30:d8: 30:64:7f:4c:ec:60:71:c6:67:e3:d5:1f:27:54:10:15: e3:d8:90:9c:0f:a4:2d:d9:94:f2:69:41:55:32:91:e2 Fingerprint (MD5): 46:AB:FA:15:95:41:F8:11:93:CC:57:83:93:29:AE:3C Fingerprint (SHA1): 4D:EA:73:DF:66:E0:D3:68:3A:AD:53:20:55:81:76:4E:45:62:1E:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1802: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174539 (0x1371074b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:18 2012 Not After : Sun Mar 26 21:45:18 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:7f:b8:3f:46:e0:da:08:12:f0:55:5c:c2:4e:96:7d: 2c:89:85:23:62:87:09:a9:49:b1:17:a0:cc:50:77:b1: f2:79:81:ab:58:29:ed:79:66:c4:d2:e3:29:a6:58:a4: 39:06:c6:af:a5:85:73:bc:f5:3b:b3:ea:91:ff:ae:df: f9:6c:32:0a:96:10:4e:31:15:fe:7a:62:9c:7d:fb:ec: a6:aa:ad:cd:de:d9:09:1d:2d:e2:ef:7d:bf:22:2e:07: 1d:69:70:7c:6a:4d:52:0c:bc:89:a4:2b:1c:89:36:d0: d7:8a:7a:d3:11:f7:6d:bc:0d:a3:81:52:a9:3e:3d:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: cf:5e:8f:f2:9e:b3:f4:88:0d:dd:fd:01:4b:03:22:5d: f5:fd:8e:f3:7b:d2:d8:12:bd:e1:fb:62:90:49:d3:78: ef:8e:cc:38:08:b8:06:fb:3d:7d:84:7e:ab:56:34:10: 22:10:49:8e:f7:0d:2d:60:01:80:7c:e3:72:51:3d:b1: 1c:cd:16:a1:6d:20:09:ac:68:29:cd:c9:a4:e4:ef:f7: 08:38:20:3b:21:27:38:39:d3:e7:ab:45:73:df:32:43: 06:b0:a4:1e:f5:fb:78:b9:71:51:a4:3f:e4:4e:d7:62: f3:4c:2e:03:1d:a0:70:c8:cb:09:45:a6:3c:3d:65:81 Fingerprint (MD5): 64:B6:28:99:19:67:57:DE:94:57:22:8D:35:63:48:86 Fingerprint (SHA1): 80:7A:30:8E:2F:15:EB:54:1F:3A:A7:77:58:B5:50:A5:CD:88:06:96 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1803: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1804: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1805: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174540 (0x1371074c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:45:19 2012 Not After : Sun Mar 26 21:45:19 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:79:1f:45:a9:a7:b1:5c:f3:cc:c1:79:75:8d:9a:2d: f4:cb:37:8a:fd:47:48:42:5b:12:46:21:d6:1e:f2:2e: b1:fe:53:5b:2e:b8:44:8d:c6:87:11:cd:97:4d:1a:74: 4f:61:19:7c:2c:e4:80:ed:cc:e5:5e:70:0f:19:35:3b: 7c:a0:8d:10:cb:f8:66:05:15:7a:01:61:67:eb:cb:55: 8e:b8:bc:e2:1f:67:58:e8:48:52:6b:5b:3b:30:12:70: 4d:96:74:9a:c1:8d:55:56:c9:f1:f0:00:72:9f:3a:bb: 28:09:d4:1d:f5:d3:6b:5a:72:de:23:2d:20:0f:4d:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 37:26:d5:88:3d:bf:de:0a:0f:41:10:c5:12:94:ef:2a: ce:68:4e:04:d2:00:0e:e3:03:43:dc:0a:5d:6c:6f:d4: ab:9c:1d:0e:38:10:db:e6:62:47:ee:ab:0d:a0:07:4b: 38:83:86:2b:fd:15:73:c4:d7:f3:5f:ef:5f:b2:53:5f: b0:23:4a:cc:7d:91:a0:4c:dd:a0:4e:49:e4:62:04:b7: 18:39:81:56:ba:be:aa:77:7b:a6:71:1b:e3:a1:0c:d0: 02:12:06:73:73:e9:70:60:59:d6:7e:8c:4a:92:2b:33: 9d:9a:4f:fc:a4:3f:50:bb:9f:96:88:78:f7:4a:6e:f2 Fingerprint (MD5): D5:10:79:4B:7A:47:F5:79:4D:F7:8F:0C:F5:03:B7:A1 Fingerprint (SHA1): 0A:45:74:46:07:9C:FB:F9:F0:BE:7E:13:AD:6C:A0:E8:5B:00:35:7F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1806: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1807: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174543 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1808: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1809: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1810: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1811: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174544 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1812: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1813: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1814: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1815: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174545 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-CA1Root-326174453.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1816: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1817: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1818: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1819: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174546 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1820: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #1821: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1822: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1823: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174547 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1824: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1825: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1826: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174548 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1827: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1828: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1829: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1830: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174549 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1831: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #1832: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174550 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1833: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #1834: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1835: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1836: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1837: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174551 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-Bridge-326174454.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1838: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #1839: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1840: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1841: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174552 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1842: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1843: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1844: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1845: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174553 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1846: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1847: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1848: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174554 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1849: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1850: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1851: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1852: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174555 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1853: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #1854: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174556 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1855: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #1856: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1857: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1858: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1859: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174557 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-Bridge-326174455.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1860: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #1861: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1862: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1863: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174558 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1864: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1865: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1866: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1867: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326174559 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-BridgeNavy-326174456.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1868: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #1869: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1870: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1871: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174560 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1872: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #1873: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1874: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1875: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174561 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1876: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1877: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1878: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174562 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1879: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1880: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1881: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1882: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 326174563 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1883: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der chains.sh: #1884: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1885: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1886: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 326174564 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1887: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der chains.sh: #1888: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1889: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1890: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 326174565 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1891: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der chains.sh: #1892: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 326174566 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1893: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der chains.sh: #1894: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1895: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1896: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1897: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174567 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1898: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #1899: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1900: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1901: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326174568 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1902: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #1903: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1904: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1905: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174569 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1906: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1907: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1908: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1909: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174570 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1910: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #1911: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1912: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174561 (0x13710761) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:45:24 2012 Not After : Sun Mar 26 21:45:24 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:26:89:9e:81:00:e4:38:86:fd:62:1f:2d:0f:62:a0: e5:c6:25:5a:e4:c1:8d:8b:b7:52:e2:9f:ff:97:9c:b0: 73:4d:59:82:85:b6:58:05:7a:30:0a:dc:d0:38:aa:91: 15:47:9b:bf:6c:78:d3:e4:91:c6:fe:e6:fa:66:02:e8: 86:cb:86:06:b5:35:41:fb:d9:42:6a:06:59:bb:b3:d9: 09:92:0b:0a:9d:69:cd:7a:0f:a5:ac:cd:9f:95:64:bd: 44:4f:ef:77:2e:59:c7:0a:a6:6d:08:24:48:a0:32:da: a9:2b:88:9f:8e:ef:3d:79:87:5a:76:3c:2b:09:62:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: be:1a:1d:dd:3b:8a:bc:36:1d:1e:b1:e4:0c:b1:23:db: ea:d4:d7:f6:a7:18:38:70:64:df:10:bf:b8:54:d1:69: 8a:83:12:22:2c:d5:46:60:db:3c:a7:74:e8:33:d6:8c: bd:42:c9:23:73:5b:8f:91:95:8f:c6:8b:cc:b9:89:52: f9:2f:ec:14:48:c5:18:fc:59:16:41:be:68:41:13:d3: 93:83:1f:3f:22:08:27:17:2d:cc:72:f1:8e:00:02:4d: b1:b1:49:08:ed:39:cb:4c:bf:a9:bc:00:81:5f:2f:30: 83:61:08:72:d2:05:e1:da:48:0c:b4:5d:b2:45:35:7b Fingerprint (MD5): 6D:FE:6F:6E:EB:BF:9D:B2:7B:45:DA:CB:60:AC:20:0B Fingerprint (SHA1): 6F:BC:6C:EF:5A:25:83:F0:CE:B6:79:80:EC:2B:CD:92:39:57:07:66 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1913: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1914: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1915: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1916: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1917: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1918: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1919: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1920: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1921: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174562 (0x13710762) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:45:24 2012 Not After : Sun Mar 26 21:45:24 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:9b:87:19:3b:1b:7d:2f:6a:ad:dc:e5:f5:37:b8:5b: b1:56:06:8d:d5:51:83:a8:61:4c:14:ba:51:5e:bc:eb: 92:14:05:31:24:00:a8:45:0b:f8:9e:64:90:cb:cc:10: b1:4c:b7:51:20:b8:f6:e8:cc:ea:ce:81:77:ac:8c:00: 26:ba:89:f9:98:62:0c:68:b0:f2:75:9a:dc:7a:37:54: 27:2b:2f:6b:6c:72:3d:7d:ce:fc:49:77:23:e4:44:52: a3:dd:20:ff:9f:43:46:27:68:74:4e:f3:30:1e:87:3a: e9:bc:b2:94:21:dd:b3:40:81:ba:05:0f:c7:fa:08:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 94:35:a0:ac:b8:26:c4:f8:d5:a6:fd:f8:ff:33:d6:82: 73:37:60:92:de:ad:c5:21:27:b5:98:32:ea:ab:b7:ee: ed:d2:17:a2:53:59:18:33:d3:53:dc:7a:63:c1:9c:08: f1:6d:b9:01:9a:20:fd:8c:60:30:45:f4:9e:a8:6f:7a: fa:80:0b:a3:7c:df:59:0c:d3:25:49:c4:55:cd:08:0c: 84:66:23:f9:14:80:f7:2f:c7:13:9b:7d:79:59:73:74: 77:c5:be:cb:1a:d4:fa:c8:6d:10:f4:8e:ab:9f:5b:41: 7e:6d:27:ce:d0:41:b5:63:d2:94:98:1a:c0:83:e3:90 Fingerprint (MD5): 37:39:53:43:A6:93:B1:C4:DD:21:DD:88:43:B1:63:D0 Fingerprint (SHA1): 6E:DE:79:F3:7B:DE:70:78:9D:4B:50:48:56:6F:0F:06:5F:2E:DE:63 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1922: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1923: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1924: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1925: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1926: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1927: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1928: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1929: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1930: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1931: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1932: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1933: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1934: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1935: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1936: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1937: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig n, Inc.",C=US" Validity: Not Before: Wed Nov 08 00:00:00 2006 Not After : Sun Nov 07 23:59:59 2021 Subject: "CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve riSign Trust Network,O="VeriSign, Inc.",C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: CRL Distribution Points Distribution point: URI: "http://crl.verisign.com/pca3.crl" Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: OID.1.3.6.1.5.5.7.1.12 Data: Sequence { [1]: { [0]: { Sequence { Sequence { Sequence { "image/gif" Sequence { Sequence { Sequence { SHA-1 } 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: 80:6a:d4:48:18:2c:7b:19:2e } } Sequence { "http://logo.verisign.com/vslogo.gif" } } } } } } } Name: Certificate Policies Data: Policy Name: Certificate Policies AnyPolicy Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Qualifier Data: "https://www.verisign.com/cps" Name: Certificate Subject Key ID Data: 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: af:33:31:33 Name: Certificate Authority Key Identifier Issuer: Directory Name: "OU=Class 3 Public Primary Certification Auth ority,O="VeriSign, Inc.",C=US" Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 Fingerprint (MD5): C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C Fingerprint (SHA1): 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= US,serialNumber=3014267,businessCategory=Private Organization,incorporati onState=Delaware,incorporationCountry=US" Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network ,O="VeriSign, Inc.",C=US" Returned value is 0, expected result is pass chains.sh: #1938: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1939: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1940: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174571 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1941: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1942: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1943: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1944: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174572 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1945: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1946: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1947: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1948: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174573 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1949: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1950: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1951: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1952: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 326174574 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1953: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der chains.sh: #1954: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1955: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1956: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174575 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1957: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #1958: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1959: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1960: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 326174576 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1961: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der chains.sh: #1962: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1963: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1964: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 326174577 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1965: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der chains.sh: #1966: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1967: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1968: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 326174578 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1969: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der chains.sh: #1970: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1971: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1972: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 326174579 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1973: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der chains.sh: #1974: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1975: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174571 (0x1371076b) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:28 2012 Not After : Sun Mar 26 21:45:28 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 22:b6:37:3b:f8:2b:b5:f3:0f:7f:72:e7:49:7b:c1:62: f2:dd:5b:44:94:ae:5d:46:1a:41:01:53:87:10:5d:9e: 9f:2b:c2:98:39:8e:a1:73:74:f8:5e:81:6a:ec:25:34: ec:ee:3f:52:72:db:aa:3e:ad:0a:c4:18:03:64:78:af: 0f:17:58:aa:d3:0b:b2:0c:af:e4:6c:2d:8c:e5:80:7d: e5:4d:1c:a3:3b:92:78:da:ed:a7:50:53:93:ec:9c:27: 03:4e:ee:4c:b0:d1:b0:1e:19:fe:65:44:78:3b:11:67: a0:49:00:6e:6e:20:67:f3:8f:79:06:f9:2f:fc:c5:75 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:98:64:68:27:30:49:04:ca:36:f1:12: 91:f2:b5:be:6d:38:79:93:9b:02:14:1a:73:b0:25:f9: d5:ce:67:4f:8f:f5:08:78:0e:24:6c:6d:d0:db:ef Fingerprint (MD5): 04:54:F7:CD:07:03:43:0A:83:E6:3F:D3:D0:32:42:40 Fingerprint (SHA1): E3:6C:CB:C2:DD:53:83:E5:33:43:8A:BE:50:31:2D:33:03:06:81:83 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1976: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174571 (0x1371076b) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:28 2012 Not After : Sun Mar 26 21:45:28 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 22:b6:37:3b:f8:2b:b5:f3:0f:7f:72:e7:49:7b:c1:62: f2:dd:5b:44:94:ae:5d:46:1a:41:01:53:87:10:5d:9e: 9f:2b:c2:98:39:8e:a1:73:74:f8:5e:81:6a:ec:25:34: ec:ee:3f:52:72:db:aa:3e:ad:0a:c4:18:03:64:78:af: 0f:17:58:aa:d3:0b:b2:0c:af:e4:6c:2d:8c:e5:80:7d: e5:4d:1c:a3:3b:92:78:da:ed:a7:50:53:93:ec:9c:27: 03:4e:ee:4c:b0:d1:b0:1e:19:fe:65:44:78:3b:11:67: a0:49:00:6e:6e:20:67:f3:8f:79:06:f9:2f:fc:c5:75 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:98:64:68:27:30:49:04:ca:36:f1:12: 91:f2:b5:be:6d:38:79:93:9b:02:14:1a:73:b0:25:f9: d5:ce:67:4f:8f:f5:08:78:0e:24:6c:6d:d0:db:ef Fingerprint (MD5): 04:54:F7:CD:07:03:43:0A:83:E6:3F:D3:D0:32:42:40 Fingerprint (SHA1): E3:6C:CB:C2:DD:53:83:E5:33:43:8A:BE:50:31:2D:33:03:06:81:83 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1977: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174571 (0x1371076b) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:28 2012 Not After : Sun Mar 26 21:45:28 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 22:b6:37:3b:f8:2b:b5:f3:0f:7f:72:e7:49:7b:c1:62: f2:dd:5b:44:94:ae:5d:46:1a:41:01:53:87:10:5d:9e: 9f:2b:c2:98:39:8e:a1:73:74:f8:5e:81:6a:ec:25:34: ec:ee:3f:52:72:db:aa:3e:ad:0a:c4:18:03:64:78:af: 0f:17:58:aa:d3:0b:b2:0c:af:e4:6c:2d:8c:e5:80:7d: e5:4d:1c:a3:3b:92:78:da:ed:a7:50:53:93:ec:9c:27: 03:4e:ee:4c:b0:d1:b0:1e:19:fe:65:44:78:3b:11:67: a0:49:00:6e:6e:20:67:f3:8f:79:06:f9:2f:fc:c5:75 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:98:64:68:27:30:49:04:ca:36:f1:12: 91:f2:b5:be:6d:38:79:93:9b:02:14:1a:73:b0:25:f9: d5:ce:67:4f:8f:f5:08:78:0e:24:6c:6d:d0:db:ef Fingerprint (MD5): 04:54:F7:CD:07:03:43:0A:83:E6:3F:D3:D0:32:42:40 Fingerprint (SHA1): E3:6C:CB:C2:DD:53:83:E5:33:43:8A:BE:50:31:2D:33:03:06:81:83 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1978: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174571 (0x1371076b) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:28 2012 Not After : Sun Mar 26 21:45:28 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 22:b6:37:3b:f8:2b:b5:f3:0f:7f:72:e7:49:7b:c1:62: f2:dd:5b:44:94:ae:5d:46:1a:41:01:53:87:10:5d:9e: 9f:2b:c2:98:39:8e:a1:73:74:f8:5e:81:6a:ec:25:34: ec:ee:3f:52:72:db:aa:3e:ad:0a:c4:18:03:64:78:af: 0f:17:58:aa:d3:0b:b2:0c:af:e4:6c:2d:8c:e5:80:7d: e5:4d:1c:a3:3b:92:78:da:ed:a7:50:53:93:ec:9c:27: 03:4e:ee:4c:b0:d1:b0:1e:19:fe:65:44:78:3b:11:67: a0:49:00:6e:6e:20:67:f3:8f:79:06:f9:2f:fc:c5:75 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:98:64:68:27:30:49:04:ca:36:f1:12: 91:f2:b5:be:6d:38:79:93:9b:02:14:1a:73:b0:25:f9: d5:ce:67:4f:8f:f5:08:78:0e:24:6c:6d:d0:db:ef Fingerprint (MD5): 04:54:F7:CD:07:03:43:0A:83:E6:3F:D3:D0:32:42:40 Fingerprint (SHA1): E3:6C:CB:C2:DD:53:83:E5:33:43:8A:BE:50:31:2D:33:03:06:81:83 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1979: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1980: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1981: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1982: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1983: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1984: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1985: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #1986: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1987: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1988: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1989: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #1990: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1991: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1992: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1993: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #1994: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1995: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1996: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1997: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der chains.sh: #1998: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1999: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2000: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2001: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #2002: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2003: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2004: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2005: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #2006: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326214532Z nextupdate=20130326214532Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:45:32 2012 Next Update: Tue Mar 26 21:45:32 2013 CRL Extensions: chains.sh: #2007: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214532Z nextupdate=20130326214532Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:45:32 2012 Next Update: Tue Mar 26 21:45:32 2013 CRL Extensions: chains.sh: #2008: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214532Z nextupdate=20130326214532Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:45:32 2012 Next Update: Tue Mar 26 21:45:32 2013 CRL Extensions: chains.sh: #2009: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326214532Z nextupdate=20130326214532Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:45:32 2012 Next Update: Tue Mar 26 21:45:32 2013 CRL Extensions: chains.sh: #2010: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214533Z addcert 14 20120326214533Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:45:33 2012 Next Update: Tue Mar 26 21:45:32 2013 Entry (1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 26 21:45:33 2012 CRL Extensions: chains.sh: #2011: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214534Z addcert 15 20120326214534Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:45:34 2012 Next Update: Tue Mar 26 21:45:32 2013 Entry (1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 26 21:45:34 2012 CRL Extensions: chains.sh: #2012: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2013: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2014: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2015: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #2016: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #2017: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #2018: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #2019: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #2020: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #2021: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:31 2012 Not After : Sun Mar 26 21:45:31 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:7e:ff:91:35:ec:73:90:f9:f0:d8:37:04:a9:0f:03: d5:10:49:c0:a8:94:91:be:5c:de:58:4e:ef:59:76:cb: 52:f7:e6:63:cd:8c:d7:21:54:90:bd:ab:a5:06:8c:55: 78:de:9f:4f:e7:bb:7c:60:26:89:60:b8:fe:fc:ef:73: df:e2:43:27:ad:28:45:3f:ac:4f:3d:35:5e:96:60:6f: 1a:2d:96:78:f1:7f:b6:5d:46:47:da:17:42:f4:70:66: 12:a3:4c:21:e1:6c:57:33:33:b3:19:b7:7a:4f:03:76: c3:8a:f6:d0:84:ef:a0:72:66:cc:80:29:99:d2:3b:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 49:5f:90:c2:98:c2:76:94:f9:6b:7e:7a:cd:42:4d:70: 25:3c:8e:69:59:a8:de:e9:32:bb:49:f7:fd:e5:77:21: 87:b8:a6:b3:37:1f:39:ad:01:82:d7:29:fc:e3:68:72: c5:08:c5:8f:5d:6a:16:8d:84:d0:f1:74:e3:18:90:6d: 29:26:5c:b9:a9:2f:16:df:2f:3b:6e:b0:21:51:89:f1: f6:fe:3c:ee:13:c2:d2:7b:cf:7e:81:4d:b5:38:f9:b8: e8:60:1d:e4:7e:6b:d5:d1:81:53:7a:9c:3f:4d:1f:bd: 92:27:2d:54:30:fe:2f:b5:25:dd:96:4c:4a:86:8c:47 Fingerprint (MD5): 5B:DE:C2:6B:C3:B2:09:88:88:C5:B0:55:68:BB:39:00 Fingerprint (SHA1): E0:AC:3B:F3:B5:41:BF:89:09:E3:CF:86:53:58:69:E0:CA:06:11:8B Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2022: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2023: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:45:31 2012 Not After : Sun Mar 26 21:45:31 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:7e:ff:91:35:ec:73:90:f9:f0:d8:37:04:a9:0f:03: d5:10:49:c0:a8:94:91:be:5c:de:58:4e:ef:59:76:cb: 52:f7:e6:63:cd:8c:d7:21:54:90:bd:ab:a5:06:8c:55: 78:de:9f:4f:e7:bb:7c:60:26:89:60:b8:fe:fc:ef:73: df:e2:43:27:ad:28:45:3f:ac:4f:3d:35:5e:96:60:6f: 1a:2d:96:78:f1:7f:b6:5d:46:47:da:17:42:f4:70:66: 12:a3:4c:21:e1:6c:57:33:33:b3:19:b7:7a:4f:03:76: c3:8a:f6:d0:84:ef:a0:72:66:cc:80:29:99:d2:3b:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 49:5f:90:c2:98:c2:76:94:f9:6b:7e:7a:cd:42:4d:70: 25:3c:8e:69:59:a8:de:e9:32:bb:49:f7:fd:e5:77:21: 87:b8:a6:b3:37:1f:39:ad:01:82:d7:29:fc:e3:68:72: c5:08:c5:8f:5d:6a:16:8d:84:d0:f1:74:e3:18:90:6d: 29:26:5c:b9:a9:2f:16:df:2f:3b:6e:b0:21:51:89:f1: f6:fe:3c:ee:13:c2:d2:7b:cf:7e:81:4d:b5:38:f9:b8: e8:60:1d:e4:7e:6b:d5:d1:81:53:7a:9c:3f:4d:1f:bd: 92:27:2d:54:30:fe:2f:b5:25:dd:96:4c:4a:86:8c:47 Fingerprint (MD5): 5B:DE:C2:6B:C3:B2:09:88:88:C5:B0:55:68:BB:39:00 Fingerprint (SHA1): E0:AC:3B:F3:B5:41:BF:89:09:E3:CF:86:53:58:69:E0:CA:06:11:8B Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2024: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2025: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED ./chains.sh: line 806: ping: command not found OCSP server not accessible, skipping OCSP tests chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2026: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174580 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2027: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2028: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #2029: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2030: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 326174581 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2031: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #2032: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2033: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 /localhost-18664-CA0-326174470.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2034: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326174457.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2035: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #2036: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #2037: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-CA0-326174470.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2038: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 326174582 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2039: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #2040: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2041: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 /localhost-18664-CA0-326174470.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2042: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326174458.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2043: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #2044: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2045: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2046: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 326174583 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2047: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #2048: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2049: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-CA0-326174470.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2050: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326174459.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2051: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der chains.sh: #2052: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2053: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-CA0-326174470.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2054: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326174460.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2055: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der chains.sh: #2056: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326214537Z nextupdate=20130326214537Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:45:37 2012 Next Update: Tue Mar 26 21:45:37 2013 CRL Extensions: chains.sh: #2057: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214537Z nextupdate=20130326214537Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:45:37 2012 Next Update: Tue Mar 26 21:45:37 2013 CRL Extensions: chains.sh: #2058: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214537Z nextupdate=20130326214537Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:45:37 2012 Next Update: Tue Mar 26 21:45:37 2013 CRL Extensions: chains.sh: #2059: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326214537Z nextupdate=20130326214537Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:45:37 2012 Next Update: Tue Mar 26 21:45:37 2013 CRL Extensions: chains.sh: #2060: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214538Z addcert 20 20120326214538Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:45:38 2012 Next Update: Tue Mar 26 21:45:37 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:45:38 2012 CRL Extensions: chains.sh: #2061: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214539Z addcert 40 20120326214539Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:45:39 2012 Next Update: Tue Mar 26 21:45:37 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:45:38 2012 Entry (2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:45:39 2012 CRL Extensions: chains.sh: #2062: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2063: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2064: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2065: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined TIMESTAMP chains END: Mon Mar 26 17:45:39 EDT 2012 chains.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Mon Mar 26 17:45:40 EDT 2012 TIMESTAMP libpkix END: Mon Mar 26 17:45:40 EDT 2012 Running tests for cert TIMESTAMP cert BEGIN: Mon Mar 26 17:45:40 EDT 2012 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #2066: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2067: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2068: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2069: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #2070: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #2071: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2072: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2073: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #2074: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2075: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #2076: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2077: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #2078: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #2079: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2080: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2081: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #2082: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2083: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #2084: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2085: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #2086: Exporting Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #2087: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2088: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2089: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #2090: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #2091: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #2092: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert cert.sh: #2093: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert cert.sh: #2094: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #2095: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #2096: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2097: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2098: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #2099: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert cert.sh: #2100: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #2101: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #2102: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert cert.sh: #2103: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert cert.sh: #2104: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #2105: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2106: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #2107: Import Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2108: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #2109: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert cert.sh: #2110: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #2111: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2112: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #2113: Import Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2114: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #2115: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #2116: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2117: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #2118: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert cert.sh: #2119: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #2120: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #2121: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2122: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #2123: Import Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2124: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #2125: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert cert.sh: #2126: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #2127: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2128: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #2129: Import Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2130: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #2131: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert cert.sh: #2132: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #2133: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2134: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #2135: Import Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2136: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #2137: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert cert.sh: #2138: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #2139: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2140: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #2141: Import Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2142: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #2143: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert cert.sh: #2144: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #2145: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #2146: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #2147: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #2148: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #2149: Import Eve's cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #2150: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2151: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #2152: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... cert.sh: #2153: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #2154: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2155: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #2156: Import Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2157: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #2158: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert cert.sh: #2159: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:7b Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:44 2012 Not After : Tue Jun 26 21:45:44 2012 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:77:19:ab:ee:ba:3e:ab:5f:bb:62:8c:2f:f3:0a:2e: b7:fa:c3:6e:6a:1a:43:7b:dd:b4:79:24:48:01:3d:d4: f3:8d:db:b0:d8:db:80:f7:e3:5b:82:5e:35:90:dc:53: 31:2b:79:da:77:9f:66:16:bf:24:e5:a8:db:7c:76:80: 95:60:5f:8e:1b:18:0f:f7:44:96:2a:dc:5f:af:f9:cc: d8:d9:fd:5a:78:24:1d:aa:ab:b7:ac:02:49:ba:a0:0c: 52:c8:d5:f2:31:46:c7:14:aa:99:09:d7:94:09:84:f9: 51:dd:08:9b:15:2f:66:e8:9d:e3:8f:c2:4d:e9:41:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 87:1a:5b:b0:87:c8:22:06:f1:b5:59:61:bc:f8:e5:64: f5:f8:1a:62:50:eb:61:98:18:00:36:a1:00:2c:f0:7b: 3e:40:dd:f3:a0:2c:ca:f2:5b:60:05:0b:30:35:97:d1: 31:51:34:ce:ef:15:f5:f6:85:00:58:81:85:92:29:0c: da:26:04:11:8c:e2:30:fb:24:34:17:0e:b8:14:cf:f4: cc:94:3b:48:95:d2:04:dc:16:66:27:34:1d:f7:82:a2: a8:b6:1f:51:da:08:ff:92:d6:c0:79:b8:e0:5b:13:57: f4:11:31:8e:49:fa:38:c0:f7:70:c7:c8:61:f8:76:5c Fingerprint (MD5): F0:FF:FB:CF:B5:48:DC:EC:8B:C1:A9:33:7D:E1:4B:38 Fingerprint (SHA1): 38:D0:A7:18:18:12:31:6C:82:93:30:7F:CE:7A:78:D5:58:FC:E0:32 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2160: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:7c Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:44 2012 Not After : Tue Jun 26 21:45:44 2012 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:45:a7:1e:43:ad:69:b6:8d:33:69:2c:f1:0c:ce:9a: 21:72:ab:38:8d:53:89:b7:f8:99:93:92:5c:e4:47:72: 57:eb:a2:03:7a:ff:9f:ad:94:89:c7:26:75:21:32:91: bb:20:1b:bf:b6:6b:87:e3:64:2a:57:93:27:cb:c9:02: 00:5b:ce:97:67:b4:90:9a:e8:3b:cd:72:f9:ad:38:36: b1:54:62:8e:90:cd:05:d0:2e:b7:58:13:7b:a9:80:93: 3e:f8:ac:80:f5:7c:ba:a6:dc:f7:ce:25:3b:ed:1e:d7: 90:25:55:19:51:d0:fe:08:77:f3:db:8f:f8:18:b6:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5c:ce:a3:df:1d:e1:7e:d2:6d:e5:93:99:62:c9:3c:f3: c7:ce:88:e4:a6:da:24:5a:0a:6d:aa:db:73:d9:43:20: a5:ca:b5:fb:1a:3a:a2:74:54:b3:b4:b6:ba:4b:a1:1f: 09:69:13:23:2f:1f:e5:d5:cd:c6:53:52:9d:90:ec:e7: 84:3a:44:37:b1:e8:4c:84:26:ab:f1:83:e4:2a:1e:3f: 63:ab:3b:97:1e:91:bd:9c:fa:2e:3d:69:48:45:3d:45: d5:4c:43:86:15:8b:0b:92:7d:08:a1:96:5d:45:3f:71: 1c:35:a4:54:de:d7:f8:c2:ec:11:6e:e6:dd:a7:87:a9 Fingerprint (MD5): 3D:C6:03:4C:2A:57:19:56:F4:B2:97:D2:1F:0C:7F:20 Fingerprint (SHA1): B8:05:84:CD:A5:7D:19:05:72:58:F0:06:0D:BF:74:7F:0E:09:EC:09 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2161: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:7c Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:44 2012 Not After : Tue Jun 26 21:45:44 2012 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:82:2c:83:ed:e1:89:dd:a2:a1:26:39:37:b3:f5:62: a9:3f:e2:8e:13:d0:ff:05:b6:61:10:90:77:6d:09:6f: c5:61:76:6c:41:8c:53:b6:c3:7e:bd:95:c6:28:5d:97: 51:de:37:94:47:2b:2b:8a:a5:4b:c9:a8:d9:80:6c:c8: e9:4c:20:23:37:f4:27:94:25:2e:a7:3c:40:5b:6c:02: e3:cc:d7:ef:00:09:d4:87:31:c2:a9:eb:ee:5e:d9:b4: bb:2c:c5:61:75:bb:08:33:ae:61:a8:23:9e:bb:7b:93: 97:2d:93:15:13:66:c5:d8:74:db:3d:ef:4f:3e:6c:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:39:19:7f:f3:ea:6d:03:c0:4f:e2:25:4b:95:48:5a: cd:2b:f0:1e:6d:a8:3a:94:f8:4d:b1:a1:76:5a:a8:49: a0:e6:32:da:78:dc:c5:5a:7e:37:d8:86:05:56:89:e5: a8:ff:25:41:7b:b2:a0:e1:47:da:2a:73:39:8c:bb:be: 0e:14:a2:05:71:0b:a1:d3:61:fc:f2:8d:91:5f:92:24: c2:a9:72:17:b2:47:26:db:2c:32:f4:0a:6a:71:71:bf: d1:77:f7:5c:92:16:9c:7d:a4:ec:6a:58:6d:7f:35:bd: f6:d2:6a:28:29:7d:3f:7a:f9:34:cf:dd:3a:ee:97:f6 Fingerprint (MD5): C5:0D:85:3E:F9:FB:11:05:90:15:F4:8E:36:97:05:1F Fingerprint (SHA1): C9:F2:2B:53:73:49:68:C4:84:F9:D0:81:E7:54:F4:D1:D7:02:78:9F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2162: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:7d Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:45 2012 Not After : Tue Jun 26 21:45:45 2012 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:e1:9e:21:52:74:18:f3:fa:86:de:40:dd:c3:1f:66: 71:52:0e:0d:35:03:27:0a:0d:d2:42:7e:80:1c:bd:21: 76:4b:18:79:06:c6:5c:a3:8b:50:1c:b3:c2:22:65:82: 8a:82:83:b2:7d:e7:95:95:46:50:76:fd:07:a6:dd:bc: bb:90:3e:15:8a:37:da:0b:ef:56:a1:c9:93:99:af:50: 2a:36:21:85:ab:ef:95:ba:ad:05:60:96:18:c4:aa:4c: 77:8f:73:1f:9b:7d:fd:57:c6:ea:19:50:d5:28:92:a5: cc:02:29:ed:b5:0f:34:7a:30:08:a3:06:20:7e:a1:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 27:69:79:d2:9d:d4:be:c4:97:66:46:a2:70:71:49:5d: f6:f0:5f:17:91:71:f2:4f:a2:58:c1:f2:41:27:b9:22: e7:e4:ad:26:c8:51:57:24:e1:1c:f3:df:d5:66:b1:0f: 4b:af:89:c4:bd:61:5c:b8:77:a9:de:f7:87:d0:a0:7a: 6b:4f:ce:ca:9e:1e:dd:72:97:30:81:16:43:44:bb:ba: 5c:b1:93:a7:0e:95:73:5a:65:bd:3b:9f:7a:79:dd:2c: d1:19:56:70:cf:c5:8c:42:04:a9:e3:cb:ea:09:5c:a1: 36:11:fa:20:de:ed:eb:92:da:a8:1c:39:d7:92:97:6b Fingerprint (MD5): A2:5C:8B:19:06:29:D8:34:7E:14:88:5C:97:3C:15:88 Fingerprint (SHA1): EE:17:C1:2A:59:B2:BE:32:39:6E:48:C5:51:3C:8E:F3:49:4E:90:3C Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2163: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:7d Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:45 2012 Not After : Tue Jun 26 21:45:45 2012 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:62:19:bf:28:32:39:65:a4:d3:6d:df:dd:48:df:4c: 9f:bc:d0:be:55:05:73:ad:d9:bf:4b:29:bd:0d:51:29: df:b2:7c:1f:b8:7d:93:f6:9b:45:63:98:80:53:72:85: 56:70:fe:f4:0d:67:0b:90:36:2b:a5:da:45:7a:b5:5d: 36:f6:4e:04:1f:45:21:d9:bf:d8:16:89:f6:f7:df:8b: f0:6d:8e:57:95:d6:2d:28:15:11:31:18:3f:3a:81:92: 5f:8b:52:b1:ba:18:ef:20:da:7c:63:36:91:b8:e1:9e: f3:cb:58:87:fa:b4:d5:d4:46:be:76:c5:e5:29:c6:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 29:47:41:2a:ef:cc:40:36:52:c8:02:47:c2:a1:ad:9f: 4f:dc:fa:e1:a2:d5:c3:d9:f8:55:f8:4f:4a:39:d3:9b: 95:e6:4d:4e:65:3e:c7:f7:17:1b:52:b6:c4:57:7c:d0: a6:2e:dd:7f:e9:46:ee:56:98:52:2b:79:a3:fe:c1:50: a5:32:0f:f5:cf:25:30:bd:9b:67:8e:3b:be:a2:3f:1e: d2:66:45:68:c2:cc:92:58:97:a4:17:dc:b9:2f:26:11: 32:e3:3c:ae:f0:59:24:6f:59:cd:f7:50:f3:4d:55:be: 9e:8c:b3:63:83:d2:e6:b2:c5:72:4b:d8:ea:be:20:e7 Fingerprint (MD5): 6A:3A:DB:27:62:21:45:F4:F9:D0:34:78:86:3F:A9:06 Fingerprint (SHA1): D4:9D:01:A4:30:8D:99:B2:D6:A1:E3:1B:D5:02:AC:2C:61:D2:E0:AC Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2164: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:7e Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:45 2012 Not After : Tue Jun 26 21:45:45 2012 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:03:97:44:9c:5b:30:c2:95:3a:65:fb:d1:67:62:94: 4e:59:31:be:3a:c9:d5:31:c4:c4:8c:20:89:9a:00:0b: 0f:5e:e1:42:4d:a1:38:1f:53:bd:04:4b:07:56:99:52: f6:fa:4b:49:1f:b4:d2:a0:70:ea:3f:30:29:c0:63:ee: 1e:fb:0e:6c:23:c4:71:cf:b6:21:eb:05:0e:45:26:15: 2b:6f:80:e1:5a:49:6d:da:11:4b:3b:62:b7:02:f3:9e: 1e:1b:05:c1:db:b6:49:50:3a:9a:81:8a:87:91:6f:de: 1e:18:9f:1e:e1:85:a1:48:de:2a:89:57:af:cd:66:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:51:6f:51:c1:ca:d4:1c:d8:37:7c:d6:d0:42:44:b3: 2f:38:d2:58:be:81:c6:af:17:7f:4e:ad:79:28:47:89: b3:9a:f4:eb:25:da:d9:78:46:eb:e8:64:e6:a1:0e:fa: b2:ca:1d:ae:cf:5a:19:7c:97:24:57:5d:f8:e6:c9:11: fb:07:af:03:f8:b0:fc:81:0f:d1:20:af:8a:a1:8b:94: 94:b5:60:72:ea:e3:42:fd:08:c7:ea:28:66:4b:a3:f0: 74:7f:b2:f4:56:ae:b3:30:5c:c6:95:27:bd:5d:5f:43: a1:0e:42:c2:b1:5f:40:cd:0f:50:8d:22:4f:b0:47:73 Fingerprint (MD5): 90:2B:BB:CD:6E:69:17:1B:4C:42:E0:86:F5:E3:FF:54 Fingerprint (SHA1): 93:0F:02:8D:25:5E:E9:33:56:27:28:33:F1:74:2E:D4:7C:C9:55:0B Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2165: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:7e Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:45 2012 Not After : Tue Jun 26 21:45:45 2012 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:3f:02:e0:8f:11:45:78:9c:26:35:1c:de:0c:ef:db: 75:9e:02:04:c9:e5:78:d9:c5:af:42:bd:f8:d6:0d:8b: 9d:4f:ec:6b:8f:cd:22:b4:82:a2:b5:67:0b:4b:16:0a: d1:af:30:1b:0b:bd:83:73:a8:41:6b:0a:5a:17:ae:c1: 39:8c:61:7a:b0:9f:19:32:90:d1:90:cd:5e:3c:8b:72: 5e:28:59:1f:7c:94:04:4b:ad:5d:5b:51:91:c8:bf:5f: 14:ae:cb:b3:08:0b:dc:f0:89:89:fb:b6:19:af:ee:59: 85:ff:fa:b8:ee:7d:83:b2:a4:43:84:f8:e2:b5:9c:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7c:86:c5:98:72:1a:26:cd:ad:ed:9c:20:a8:20:85:5b: f7:b8:ff:37:69:4d:3b:5b:7a:49:22:2e:ed:ac:2d:94: 51:dc:77:9e:7e:61:df:e3:51:c9:aa:e0:5d:01:56:e1: 12:0c:0e:67:36:a3:84:d7:67:f1:9a:58:4f:0c:b3:4a: 3b:2f:04:38:e1:5e:0b:7f:f6:27:b4:e6:62:d8:6c:d0: 39:80:43:8d:0d:a2:00:a2:7f:ab:79:58:07:a2:1e:28: 4f:63:78:84:02:ed:30:4f:46:82:d0:30:c1:94:77:07: f4:a6:ff:f7:b1:b8:6a:29:16:89:68:b0:e5:08:76:e6 Fingerprint (MD5): FA:8E:AB:99:1F:7B:56:0A:E5:62:BE:43:7A:B8:B5:C7 Fingerprint (SHA1): 9F:89:83:5E:EA:57:63:C4:C3:62:F4:7C:62:6A:4A:14:66:90:59:9D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2166: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:7f Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:46 2012 Not After : Tue Jun 26 21:45:46 2012 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:40:65:07:f0:ac:d1:f5:c0:95:a8:05:9e:89:7a:ea: 4a:2a:2f:b8:4b:ea:4e:d9:1b:bd:00:10:b1:d1:a2:26: 2e:5b:89:63:fd:1b:5a:37:69:9b:e0:72:61:cf:64:e6: 88:b8:f5:cf:0c:f6:d3:84:ac:8c:74:93:e1:37:b7:fe: 49:e5:8b:79:02:be:29:02:b6:d5:c1:0d:99:25:a7:f0: 2a:be:b7:db:03:29:ea:2d:1c:58:6c:ff:31:03:0c:f7: 15:f0:92:ee:c9:72:a6:c5:22:18:36:a0:d6:78:39:08: 0a:c6:53:ea:89:1a:d5:4b:1e:4c:56:eb:56:32:aa:ef Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 75:07:c5:19:82:fb:62:26:32:d7:63:c6:de:ac:d8:85: 41:22:9a:e1:90:39:8f:70:39:e2:d5:05:1c:97:7c:c3: ff:80:28:57:7c:99:d8:0d:8f:05:bb:e2:01:15:77:ae: b6:9a:d3:0d:43:18:ff:0c:1c:c3:6f:8b:83:c3:85:b0: ab:a8:63:40:0a:de:bb:53:cd:71:a6:e1:37:31:81:c6: fc:f4:f1:ed:5b:9a:ab:dd:fa:3c:73:de:a8:59:7c:78: 6b:e8:f3:a3:24:97:bb:25:fc:4d:7c:af:88:0e:1b:95: c3:8a:58:03:1b:75:8e:9f:1f:f6:5d:49:ca:da:a2:b3 Fingerprint (MD5): 84:33:4D:C6:0E:BC:2B:A9:6E:B9:BC:41:E6:6D:26:CE Fingerprint (SHA1): E4:C8:3C:AD:86:9F:C3:B5:A8:5C:FA:71:B7:04:77:CD:C9:26:4D:8B Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2167: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:7f Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:46 2012 Not After : Tue Jun 26 21:45:46 2012 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:3e:c6:51:03:50:aa:9b:fc:69:31:51:aa:a3:de:9d: 9d:40:d1:33:6a:30:52:f8:29:2d:ac:46:70:ce:a0:db: 43:37:3b:fd:50:11:10:18:aa:5a:70:db:b9:28:fe:b5: 31:62:d4:3a:f3:ed:da:41:34:cb:79:95:0e:c6:de:ff: 3a:3f:78:75:53:d9:6a:a6:05:7c:f0:2c:5c:07:44:14: 0e:d0:c9:ea:c6:fb:f9:88:e3:b0:49:3b:cd:9f:c9:64: b2:74:0b:92:91:ac:d8:75:44:2b:d4:56:bc:b8:e1:92: 64:cc:24:8a:5f:4d:61:8e:d3:96:2b:1b:ac:69:d9:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5f:e8:da:bb:bb:1c:e2:04:5f:71:03:d2:28:0e:6f:d5: 6f:9a:bb:a8:8c:9e:75:39:3b:4a:1f:25:31:ba:51:70: 46:c1:40:88:53:7d:ab:cd:cb:ed:0d:1d:4d:ad:72:f1: 56:22:d4:d1:10:67:b7:fb:ac:1a:5c:90:93:13:09:e2: f3:32:86:3c:17:e5:f8:96:bf:f4:0d:31:ed:98:07:14: 77:5b:09:a4:7e:97:20:7a:cb:2a:b6:48:44:6b:9e:0a: 69:aa:17:4c:3a:8d:e8:b1:44:d6:05:29:02:86:86:8c: 8c:fa:4e:bd:40:53:eb:35:34:e4:a6:fb:7a:77:4a:2f Fingerprint (MD5): 9D:D3:07:00:F9:08:9E:34:26:B2:73:64:B6:DE:D5:80 Fingerprint (SHA1): 4E:D9:9A:86:E7:10:54:ED:7D:BD:05:24:32:E0:85:DC:7D:2A:54:0C Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2168: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:80 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:46 2012 Not After : Tue Jun 26 21:45:46 2012 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:65:f1:9d:91:57:dc:fb:72:73:77:a4:57:de:94:f4: 5f:64:27:a8:ff:57:c2:91:17:5b:32:34:35:01:bd:df: 03:c5:39:a4:5b:6f:df:18:3e:57:0c:c0:42:6c:9f:de: 3e:a7:be:d3:1b:f9:88:08:1a:d9:13:2d:3c:c9:d9:6d: 12:17:f2:8f:54:97:4f:53:85:33:51:16:51:ea:3c:65: 01:6e:36:b0:62:04:7c:82:cb:f2:0f:2f:a7:83:1e:9b: 99:91:76:3b:b2:3a:77:74:25:6d:0e:62:a2:f1:cf:54: d1:20:5e:41:34:7d:22:6f:ed:9b:6b:8d:ec:80:5d:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 07:20:77:29:bb:4c:04:75:3b:53:7f:0c:d6:36:c1:a3: ae:18:c6:b4:86:a3:d3:2b:2d:27:f8:34:b3:30:46:83: 00:b2:f5:ff:b3:d4:a7:0c:cf:91:64:23:bd:be:85:e0: 3d:50:b2:b4:fc:9a:68:eb:3b:27:7a:5e:98:3b:5c:26: ee:56:1b:1e:a0:2f:1a:d5:0b:3b:e0:6d:b2:32:3e:c9: 7f:ae:9d:2b:91:32:ec:d1:56:02:ed:fe:45:ec:77:09: e0:21:af:01:14:ad:54:70:55:23:0d:7b:9a:3c:2f:da: 53:29:0d:fe:21:59:00:4d:84:01:66:62:c9:10:ed:fb Fingerprint (MD5): 60:CC:86:2E:4F:DC:46:F6:7F:C4:F7:26:0B:0E:78:77 Fingerprint (SHA1): 14:5A:16:D6:0C:C6:B4:9D:36:67:9E:97:07:42:D6:19:A3:C2:E6:9E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2169: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:80 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:45:46 2012 Not After : Tue Jun 26 21:45:46 2012 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:21:bd:91:21:97:0e:9c:23:7b:30:a7:f3:8a:83:01: ce:a3:c4:5f:da:a3:c0:74:d6:5d:df:27:8d:a8:c1:dd: 81:35:ef:48:ab:0b:f8:62:f5:62:14:3d:2a:bd:4f:da: a5:c1:ef:d7:75:30:3d:c7:d6:94:7e:3e:0d:93:33:ee: b2:32:bf:0d:b1:c9:ab:fd:ba:ec:87:d7:8c:ed:c1:74: 61:f2:a3:19:1e:ea:e1:d8:bc:8a:71:0b:0b:e5:b8:6d: 28:4d:c6:77:36:d8:29:a7:8c:0c:e8:42:62:97:34:01: 29:3f:4d:a9:82:27:01:8f:e0:6b:fd:ad:be:0e:36:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 65:8d:05:4f:08:d0:65:fb:b5:59:56:b0:38:3d:a9:a9: 8b:4d:58:4a:b7:05:53:c5:2b:f1:ed:73:85:0e:5f:b5: 63:00:05:cf:26:d8:03:40:be:b7:84:10:d0:80:c2:32: 55:d6:ea:b6:86:54:cc:12:73:d3:97:a6:ae:9f:ef:57: bc:cb:91:b1:3b:03:c9:2a:dc:a0:da:3e:83:31:fc:f7: 0d:ac:5d:f9:d5:f6:ca:a1:3c:1d:19:0f:cd:cb:a3:f7: 12:35:63:44:5f:61:ef:86:81:32:af:84:8a:14:54:2f: 6c:e4:bf:94:5b:52:ea:49:a0:4f:ee:ad:28:16:29:0f Fingerprint (MD5): CE:0B:BB:02:EA:E4:88:52:0D:0A:DC:A6:6E:42:0F:2A Fingerprint (SHA1): CD:F5:E8:4B:BD:38:3C:5A:71:4A:4C:1A:72:12:45:3B:B8:09:C2:23 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2170: Certificate Key Usage Extension (11) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #2171: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2172: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2173: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #2174: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #2175: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... cert.sh: #2176: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #2177: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #2178: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2179: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #2180: Import Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2181: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #2182: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert cert.sh: #2183: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #2184: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2185: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #2186: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #2187: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2188: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: `./req' and `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #2189: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert cert.sh: #2190: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2191: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2192: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2193: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2194: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #2195: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #2196: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2197: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2198: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2199: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2200: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #2201: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2202: Verify Distrusted Cert for Object Signer - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2203: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #2204: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert cert.sh: #2205: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2206: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #2207: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert cert.sh: #2208: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2209: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #2210: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert cert.sh: #2211: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2212: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #2213: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert cert.sh: #2214: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2215: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #2216: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert cert.sh: #2217: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2218: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #2219: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert cert.sh: #2220: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2221: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #2222: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert cert.sh: #2223: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2224: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #2225: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert cert.sh: #2226: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2227: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #2228: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert cert.sh: #2229: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2230: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #2231: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert cert.sh: #2232: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2233: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #2234: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert cert.sh: #2235: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2236: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #2237: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert cert.sh: #2238: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2239: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #2240: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert cert.sh: #2241: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #2242: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #2243: Modify CRL by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #2244: Modify CRL by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #2245: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #2246: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. cert.sh: #2247: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #2248: Importing CRL for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Mar 26 17:45:58 EDT 2012 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 26 17:45:58 EDT 2012 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2249: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f6:da:67:eb:b7:48:b0:ec:5a:24:15:a5:3d:cf:ca:2d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2250: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2251: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2252: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8b:dd:96:99:63:e9:7c:2a:18:23:b5:6e:f3:ef:9e:39 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2253: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2254: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2255: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 20:4a:d7:aa:42:f3:94:1e:bb:5e:c5:9c:f7:57:d8:79 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2256: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2257: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2258: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9a:4f:15:2d:ec:b1:bc:ae:ae:f2:52:76:05:96:60:73 Iteration Count: 1 (0x1) tools.sh: #2259: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2260: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2261: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ae:d6:05:8d:21:5c:c2:7c:78:30:d6:81:ec:bb:42:ab Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2262: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2263: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2264: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:58:17:c9:ba:f9:24:22:95:9d:b9:f3:92:a5:67:10 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2265: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2266: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2267: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 74:46:49:8b:73:95:27:e1:9c:f1:35:a7:62:cc:f5:20 Iteration Count: 1 (0x1) tools.sh: #2268: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2269: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2270: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: de:ba:82:28:3e:94:39:e5:4f:6e:32:f1:6d:4c:c3:c9 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:b3:be:87:80:b6:5c:50:41:de:4f:e4:0e:8c:07: 5c:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2271: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2272: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2273: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dd:1f:c6:18:f7:56:a9:4e:33:00:da:bd:24:10:d6:39 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:10:65:bd:b6:7f:07:96:3d:23:f4:62:b9:17:0c: be:3e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2274: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2275: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2276: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 24:fa:65:77:10:be:19:1f:1b:26:15:3c:43:d7:05:5c Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:86:d2:d9:5b:3e:82:5e:fe:29:46:f3:9d:84:bd: 65:5a tools.sh: #2277: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2278: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2279: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 41:b2:2c:de:d1:49:20:91:13:67:da:f7:1b:98:7f:8c Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:d3:d2:74:8a:26:a0:a8:58:ac:43:c7:d8:d3:b2: b2:ff Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2280: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2281: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2282: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 15:85:cb:a6:69:c4:ca:4d:05:be:6a:0e:53:98:e0:5c Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:bc:be:aa:6f:d3:96:d3:cc:29:82:7f:03:5b:f8: 0f:c2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2283: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2284: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2285: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4d:ed:b4:7f:44:c5:1d:0b:1d:01:78:d1:04:5a:fc:9e Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:37:c8:37:06:04:56:f6:c9:54:f8:57:f5:f5:52: 8b:20 tools.sh: #2286: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2287: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2288: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a7:d0:10:a3:d1:c2:30:a7:06:55:c3:ad:e5:5b:de:d2 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c0:15:59:7d:ea:da:16:04:29:cb:3e:55:6e:9e: 83:20 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2289: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2290: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2291: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 22:d1:ad:c9:c4:b5:63:6c:95:a1:ba:a0:da:8c:e0:4d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:54:db:f8:e7:0b:7f:83:ab:cc:a4:a6:86:9b:a5: a3:f8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2292: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2293: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2294: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:51:9f:d2:bb:fd:e6:0c:7a:26:71:30:47:41:b6:14 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0d:6f:fa:f8:7d:82:86:37:59:33:54:ba:b1:8e: a4:63 tools.sh: #2295: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2296: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2297: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 76:e8:ab:67:cb:62:d8:c9:58:cb:c5:ea:3d:f9:a8:d7 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:73:8f:c6:79:54:c8:ba:c7:84:d1:63:61:3e:1f: 1e:38 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2298: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2299: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2300: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fa:8b:47:98:cc:e5:68:78:2a:66:ae:25:cb:cc:e2:f6 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:da:1e:ca:d9:be:32:bb:72:96:72:6b:5c:e8:24: ea:ce Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2301: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2302: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2303: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ec:cf:61:35:a2:e7:74:aa:b0:22:ef:63:34:70:22:0c Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:ac:47:7c:c4:3f:cc:01:a0:75:d8:a1:ab:31:64: 5f:f0 tools.sh: #2304: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2305: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2306: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:ad:3d:ed:d5:bc:f9:b1:bf:db:ab:a5:2e:2d:a4:9a Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:30:4f:36:71:85:8d:60:89:8e:1d:c7:8e:be:ed: 9a:ce Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2307: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2308: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2309: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b4:44:2b:3e:de:cb:8a:5f:3b:7f:03:73:05:f1:2d:ff Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:fe:11:54:a2:3b:c7:52:0d:a7:ec:7e:2b:45:41: f7:d4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2310: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2311: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2312: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:40:ef:9d:f4:e9:c1:8d:94:d5:f6:2f:c0:de:c6:94 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:90:88:a0:48:ba:04:e0:2e:21:fb:dd:a6:bd:f5: 40:55 tools.sh: #2313: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2314: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2315: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ee:7d:9a:57:de:6c:9d:c2:39:c7:3a:77:ca:6c:ff:54 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:e5:1b:37:9f:5e:a3:d7:54:d3:1b:85:56:42:9d: b1:52 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2316: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2317: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2318: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:69:08:25:28:f1:d5:88:6d:46:58:7d:62:1a:9a:13 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:9b:3b:59:52:13:ac:8d:68:9c:70:8a:c7:77:46: 58:0e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2319: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2320: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2321: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 93:5f:f2:24:69:b8:a9:f3:53:40:6b:34:e5:eb:80:4f Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:b3:26:a7:09:a5:c8:31:77:e6:b9:85:00:af:44: c0:d0 tools.sh: #2322: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2323: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2324: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 84:bc:69:16:93:7a:20:24:83:cc:48:4c:1f:db:03:69 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2325: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2326: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2327: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8b:c4:a9:f5:24:14:3f:f6:92:32:7e:e1:54:ef:24:e8 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2328: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2329: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2330: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d8:33:ae:8b:7e:21:1f:56:37:56:da:a9:95:7c:f0:50 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2331: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2332: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2333: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 4c:f6:e3:71:c9:92:db:ad:b4:61:cf:62:25:49:ad:15 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2334: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2335: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2336: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 56:93:e1:a3:15:d6:57:6f:65:16:06:32:38:2d:3e:67 Iteration Count: 1 (0x1) tools.sh: #2337: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2338: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2339: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e1:47:c4:4c:97:af:72:58:1e:a5:ef:18:11:56:7d:63 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2340: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2341: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2342: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: cb:3a:30:60:33:9a:ff:07:86:bd:8f:26:b6:09:03:8f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2343: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2344: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2345: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 96:6b:03:a3:51:64:18:a4:fe:72:4d:00:16:4b:a6:ec Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2346: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2347: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2348: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 92:c1:1d:58:42:67:05:e6:39:b6:0e:43:02:a6:fb:1b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2349: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2350: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2351: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 68:26:46:03:f4:1a:35:dc:e9:8a:9e:83:26:ba:05:be Iteration Count: 1 (0x1) tools.sh: #2352: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2353: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2354: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fc:9b:1c:b9:52:31:6d:71:e0:1c:62:c2:5f:ff:54:86 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2355: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2356: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 19:cb:84:de:40:12:4c:6b:90:c5:88:48:55:52:44:98 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2358: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2359: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2360: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8b:de:e4:79:fd:61:30:aa:1c:39:e4:61:64:e8:1a:3d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2361: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2362: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2363: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 01:72:42:cd:2b:19:88:60:82:16:c5:42:5b:46:37:11 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2364: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2365: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2366: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1d:91:9b:d5:e6:7c:f4:80:2a:f5:88:e5:0f:fc:d1:c6 Iteration Count: 1 (0x1) tools.sh: #2367: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2368: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2369: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b4:07:41:fc:cb:12:49:5f:dd:b6:01:ca:8f:c4:4f:f4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2370: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2371: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2372: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 68:50:fb:3a:f5:66:7b:77:d6:95:b6:80:aa:42:1d:99 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2373: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2374: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2375: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 14:23:5f:07:9a:18:d0:19:b2:e1:8c:8a:c5:9c:e2:27 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2376: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2377: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2378: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d1:83:00:7c:12:d6:6a:dd:ef:ce:14:ac:5c:ff:50:ba Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2379: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2380: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2381: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 50:33:f5:42:e2:f8:0a:45:8e:d0:36:fe:45:a8:ec:c9 Iteration Count: 1 (0x1) tools.sh: #2382: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2383: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2384: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:f5:73:cb:e4:74:a6:5e:f5:95:f9:7d:04:bb:d8:73 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2385: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2386: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2387: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bc:f2:3a:90:29:68:25:5e:1e:5f:1d:8a:d1:c8:81:fa Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2388: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2389: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2390: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:2d:9b:f3:70:de:58:15:0d:25:5d:e0:86:cb:cd:e0 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2391: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2392: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2393: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:e8:37:25:9c:b0:15:e5:3e:b5:b3:85:7f:41:53:7a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2394: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2395: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2396: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8b:4c:1a:a6:f6:c2:a0:72:15:af:ef:a2:3f:01:2d:94 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2397: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2398: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2399: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e4:41:49:56:72:0f:8c:41:1d:ee:b5:da:13:70:95:36 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2400: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2401: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2402: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 19:29:44:82:7b:84:0c:4d:b0:4c:76:26:be:2b:a1:59 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2403: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2404: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2405: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 32:db:35:df:04:0d:5c:55:95:80:bf:95:f0:5c:b6:35 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2406: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2407: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2408: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c1:69:fa:78:8a:f6:15:f0:e1:d1:32:04:d6:35:be:73 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2409: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2410: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2411: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:38:37:7a:46:79:34:e7:79:f1:c6:d5:89:5a:8e:5d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:40 2012 Not After : Sun Mar 26 21:45:40 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:16:4f:ea:96:d8:e1:da:3b:e8:00:89:13:a3:97:31: 0b:29:1b:e8:58:c9:d6:f5:8a:2d:f0:33:28:28:3d:8b: 74:7e:b4:5b:fd:28:e6:34:76:5c:9a:2a:07:c6:60:ed: 0c:f0:85:a2:7b:ef:57:8d:d8:8b:85:2f:80:cf:e0:32: df:1c:85:3f:e6:ee:8e:8a:5a:90:c5:ae:db:32:7f:87: 6a:9a:27:8f:b2:2e:08:f8:53:9c:81:b5:cd:6f:1b:4d: 4a:19:9b:b7:9d:11:9a:8c:46:77:9d:a2:3f:c6:0c:69: 94:cc:17:7d:a0:6e:e6:06:37:82:e1:36:a2:f9:ad:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:82:ad:99:ea:93:fc:0c:33:95:7d:77:65:43:e6:1e: 9a:0d:ff:11:60:a5:6a:e5:ee:ad:29:e0:db:43:12:d1: 3c:7d:61:e6:eb:0a:47:23:cb:b3:e6:32:db:fb:72:87: 08:e0:a8:c8:11:1b:c1:28:24:e4:04:4b:33:c2:81:df: 6a:22:54:5e:00:30:71:c3:c1:b4:5a:c5:74:7a:45:05: 49:ea:19:4c:18:44:fd:ac:50:f9:0b:29:2b:5f:6f:42: 07:66:77:5f:48:1b:13:7b:c2:76:63:85:a1:d5:2f:69: 53:10:41:56:80:6e:b8:59:8a:bf:89:e7:44:2c:de:76 Fingerprint (MD5): 9B:B8:7E:EE:AC:3D:AA:CC:2E:8B:3E:C0:DD:CF:3F:18 Fingerprint (SHA1): CD:49:08:AB:FA:C7:4C:0E:B6:89:48:AD:94:69:1D:EE:B3:90:71:0B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:45:42 2012 Not After : Sun Mar 26 21:45:42 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d7:a2:c9:8f:76:81:5c:fb:a1:b9:27:e2:cb:b9:a5: bb:0a:73:92:ba:9f:c4:27:e0:31:87:60:cc:3c:74:2a: e6:29:50:92:6d:45:b2:31:07:70:d3:43:7b:44:40:e3: d0:66:23:60:c3:3a:39:3d:35:f6:87:eb:81:33:c4:32: 71:54:dd:ac:49:be:7f:3d:31:4f:96:3e:9b:f7:df:88: 4a:7d:ec:a9:cb:31:8d:70:d1:f9:21:6e:2c:1b:58:e3: 47:9a:1e:3c:70:ac:a8:ad:27:f4:8a:75:ca:4d:51:b1: ad:ed:25:9c:f8:dc:40:15:97:e9:e8:a8:11:ff:d0:f5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:86:55:15:73:ad:47:9e:a4:fd:fc:2f:c6:68:fa:70: 0c:15:86:81:94:6e:f2:3c:05:ed:e0:dd:85:d6:c8:c8: 09:b0:78:52:81:da:cf:7c:53:07:06:53:74:40:c4:f7: c6:00:e7:c4:2c:12:c2:cc:f2:3b:b9:15:e8:43:83:2a: ce:9f:89:ee:43:b8:01:09:62:9d:7c:72:95:9f:8b:69: b8:32:7a:07:4b:e5:47:16:2c:e9:bc:95:1e:26:62:26: 0c:7e:3b:13:fa:96:21:4a:05:cf:2c:6d:77:0a:3a:d0: 29:c3:0c:d8:cd:4c:ab:1a:02:97:ee:56:35:a4:3a:4e Fingerprint (MD5): 0A:16:06:3C:70:9A:DE:5E:09:32:F4:F1:EE:9D:F4:7A Fingerprint (SHA1): 18:35:3D:C0:E8:34:22:B6:7E:5B:65:3C:E2:99:E0:53:DA:54:14:2E Friendly Name: Alice tools.sh: #2412: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2413: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #2414: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2415: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #2416: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #2417: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #2418: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #2419: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #2420: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #2421: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #2422: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Mar 26 17:46:03 EDT 2012 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 26 17:46:03 EDT 2012 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #2423: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2424: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 33f2557b576c0397d4759a4ee0b8f5f2700fb00b NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #2425: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #2426: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #2427: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #2428: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #2429: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2430: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #2431: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #2432: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #2433: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #2434: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #2435: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 33f2557b576c0397d4759a4ee0b8f5f2700fb00b FIPS_PUB_140_Test_Certificate fips.sh: #2436: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #2437: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #2438: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #2439: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #2440: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 33f2557b576c0397d4759a4ee0b8f5f2700fb00b FIPS_PUB_140_Test_Certificate fips.sh: #2441: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #2442: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #2443: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000f3d73 (998771): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #2444: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 26 17:46:12 EDT 2012 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 26 17:46:12 EDT 2012 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4663 >/dev/null 2>/dev/null selfserv_9793 with PID 4663 found at Mon Mar 26 17:46:12 EDT 2012 selfserv_9793 with PID 4663 started at Mon Mar 26 17:46:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2445: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4663 at Mon Mar 26 17:46:12 EDT 2012 kill -USR1 4663 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4663 killed at Mon Mar 26 17:46:12 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4719 >/dev/null 2>/dev/null selfserv_9793 with PID 4719 found at Mon Mar 26 17:46:12 EDT 2012 selfserv_9793 with PID 4719 started at Mon Mar 26 17:46:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2446: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4719 at Mon Mar 26 17:46:12 EDT 2012 kill -USR1 4719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4719 killed at Mon Mar 26 17:46:12 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4775 >/dev/null 2>/dev/null selfserv_9793 with PID 4775 found at Mon Mar 26 17:46:12 EDT 2012 selfserv_9793 with PID 4775 started at Mon Mar 26 17:46:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2447: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4775 at Mon Mar 26 17:46:12 EDT 2012 kill -USR1 4775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4775 killed at Mon Mar 26 17:46:12 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4843 >/dev/null 2>/dev/null selfserv_9793 with PID 4843 found at Mon Mar 26 17:46:12 EDT 2012 selfserv_9793 with PID 4843 started at Mon Mar 26 17:46:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2448: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4843 at Mon Mar 26 17:46:13 EDT 2012 kill -USR1 4843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4843 killed at Mon Mar 26 17:46:13 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4899 >/dev/null 2>/dev/null selfserv_9793 with PID 4899 found at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 with PID 4899 started at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2449: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4899 at Mon Mar 26 17:46:13 EDT 2012 kill -USR1 4899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4899 killed at Mon Mar 26 17:46:13 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4955 >/dev/null 2>/dev/null selfserv_9793 with PID 4955 found at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 with PID 4955 started at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2450: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4955 at Mon Mar 26 17:46:13 EDT 2012 kill -USR1 4955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4955 killed at Mon Mar 26 17:46:13 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5023 >/dev/null 2>/dev/null selfserv_9793 with PID 5023 found at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 with PID 5023 started at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2451: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5023 at Mon Mar 26 17:46:13 EDT 2012 kill -USR1 5023 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5023 killed at Mon Mar 26 17:46:13 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5079 >/dev/null 2>/dev/null selfserv_9793 with PID 5079 found at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 with PID 5079 started at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2452: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5079 at Mon Mar 26 17:46:13 EDT 2012 kill -USR1 5079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5079 killed at Mon Mar 26 17:46:13 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5135 >/dev/null 2>/dev/null selfserv_9793 with PID 5135 found at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 with PID 5135 started at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2453: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5135 at Mon Mar 26 17:46:13 EDT 2012 kill -USR1 5135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5135 killed at Mon Mar 26 17:46:13 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5203 >/dev/null 2>/dev/null selfserv_9793 with PID 5203 found at Mon Mar 26 17:46:13 EDT 2012 selfserv_9793 with PID 5203 started at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2454: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5203 at Mon Mar 26 17:46:14 EDT 2012 kill -USR1 5203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5203 killed at Mon Mar 26 17:46:14 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5259 >/dev/null 2>/dev/null selfserv_9793 with PID 5259 found at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 with PID 5259 started at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2455: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5259 at Mon Mar 26 17:46:14 EDT 2012 kill -USR1 5259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5259 killed at Mon Mar 26 17:46:14 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5315 >/dev/null 2>/dev/null selfserv_9793 with PID 5315 found at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 with PID 5315 started at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2456: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5315 at Mon Mar 26 17:46:14 EDT 2012 kill -USR1 5315 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5315 killed at Mon Mar 26 17:46:14 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5383 >/dev/null 2>/dev/null selfserv_9793 with PID 5383 found at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 with PID 5383 started at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2457: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5383 at Mon Mar 26 17:46:14 EDT 2012 kill -USR1 5383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5383 killed at Mon Mar 26 17:46:14 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5439 >/dev/null 2>/dev/null selfserv_9793 with PID 5439 found at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 with PID 5439 started at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2458: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5439 at Mon Mar 26 17:46:14 EDT 2012 kill -USR1 5439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5439 killed at Mon Mar 26 17:46:14 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5495 >/dev/null 2>/dev/null selfserv_9793 with PID 5495 found at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 with PID 5495 started at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2459: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5495 at Mon Mar 26 17:46:14 EDT 2012 kill -USR1 5495 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5495 killed at Mon Mar 26 17:46:14 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5563 >/dev/null 2>/dev/null selfserv_9793 with PID 5563 found at Mon Mar 26 17:46:14 EDT 2012 selfserv_9793 with PID 5563 started at Mon Mar 26 17:46:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2460: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5563 at Mon Mar 26 17:46:14 EDT 2012 kill -USR1 5563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5563 killed at Mon Mar 26 17:46:15 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5619 >/dev/null 2>/dev/null selfserv_9793 with PID 5619 found at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 with PID 5619 started at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2461: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5619 at Mon Mar 26 17:46:15 EDT 2012 kill -USR1 5619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5619 killed at Mon Mar 26 17:46:15 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5675 >/dev/null 2>/dev/null selfserv_9793 with PID 5675 found at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 with PID 5675 started at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2462: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 5675 at Mon Mar 26 17:46:15 EDT 2012 kill -USR1 5675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5675 killed at Mon Mar 26 17:46:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5743 >/dev/null 2>/dev/null selfserv_9793 with PID 5743 found at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 with PID 5743 started at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2463: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5743 at Mon Mar 26 17:46:15 EDT 2012 kill -USR1 5743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5743 killed at Mon Mar 26 17:46:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5799 >/dev/null 2>/dev/null selfserv_9793 with PID 5799 found at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 with PID 5799 started at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2464: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5799 at Mon Mar 26 17:46:15 EDT 2012 kill -USR1 5799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5799 killed at Mon Mar 26 17:46:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5855 >/dev/null 2>/dev/null selfserv_9793 with PID 5855 found at Mon Mar 26 17:46:15 EDT 2012 selfserv_9793 with PID 5855 started at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2465: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5855 at Mon Mar 26 17:46:16 EDT 2012 kill -USR1 5855 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5855 killed at Mon Mar 26 17:46:16 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5923 >/dev/null 2>/dev/null selfserv_9793 with PID 5923 found at Mon Mar 26 17:46:16 EDT 2012 selfserv_9793 with PID 5923 started at Mon Mar 26 17:46:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2466: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5923 at Mon Mar 26 17:46:17 EDT 2012 kill -USR1 5923 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5923 killed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5979 >/dev/null 2>/dev/null selfserv_9793 with PID 5979 found at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 with PID 5979 started at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2467: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5979 at Mon Mar 26 17:46:17 EDT 2012 kill -USR1 5979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5979 killed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6035 >/dev/null 2>/dev/null selfserv_9793 with PID 6035 found at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 with PID 6035 started at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2468: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 6035 at Mon Mar 26 17:46:17 EDT 2012 kill -USR1 6035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6035 killed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6103 >/dev/null 2>/dev/null selfserv_9793 with PID 6103 found at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 with PID 6103 started at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2469: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6103 at Mon Mar 26 17:46:17 EDT 2012 kill -USR1 6103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6103 killed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6159 >/dev/null 2>/dev/null selfserv_9793 with PID 6159 found at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 with PID 6159 started at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2470: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 6159 at Mon Mar 26 17:46:17 EDT 2012 kill -USR1 6159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6159 killed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6215 >/dev/null 2>/dev/null selfserv_9793 with PID 6215 found at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 with PID 6215 started at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2471: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6215 at Mon Mar 26 17:46:17 EDT 2012 kill -USR1 6215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6215 killed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6283 >/dev/null 2>/dev/null selfserv_9793 with PID 6283 found at Mon Mar 26 17:46:17 EDT 2012 selfserv_9793 with PID 6283 started at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2472: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6283 at Mon Mar 26 17:46:17 EDT 2012 kill -USR1 6283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6283 killed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6339 >/dev/null 2>/dev/null selfserv_9793 with PID 6339 found at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 with PID 6339 started at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2473: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6339 at Mon Mar 26 17:46:18 EDT 2012 kill -USR1 6339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6339 killed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6395 >/dev/null 2>/dev/null selfserv_9793 with PID 6395 found at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 with PID 6395 started at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2474: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6395 at Mon Mar 26 17:46:18 EDT 2012 kill -USR1 6395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6395 killed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6463 >/dev/null 2>/dev/null selfserv_9793 with PID 6463 found at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 with PID 6463 started at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2475: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6463 at Mon Mar 26 17:46:18 EDT 2012 kill -USR1 6463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6463 killed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6519 >/dev/null 2>/dev/null selfserv_9793 with PID 6519 found at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 with PID 6519 started at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2476: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6519 at Mon Mar 26 17:46:18 EDT 2012 kill -USR1 6519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6519 killed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6578 >/dev/null 2>/dev/null selfserv_9793 with PID 6578 found at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 with PID 6578 started at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2477: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6578 at Mon Mar 26 17:46:18 EDT 2012 kill -USR1 6578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6578 killed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6649 >/dev/null 2>/dev/null selfserv_9793 with PID 6649 found at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 with PID 6649 started at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2478: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6649 at Mon Mar 26 17:46:18 EDT 2012 kill -USR1 6649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6649 killed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6705 >/dev/null 2>/dev/null selfserv_9793 with PID 6705 found at Mon Mar 26 17:46:18 EDT 2012 selfserv_9793 with PID 6705 started at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2479: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 6705 at Mon Mar 26 17:46:19 EDT 2012 kill -USR1 6705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6705 killed at Mon Mar 26 17:46:19 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6761 >/dev/null 2>/dev/null selfserv_9793 with PID 6761 found at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 with PID 6761 started at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2480: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6761 at Mon Mar 26 17:46:19 EDT 2012 kill -USR1 6761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6761 killed at Mon Mar 26 17:46:19 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6829 >/dev/null 2>/dev/null selfserv_9793 with PID 6829 found at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 with PID 6829 started at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2481: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 6829 at Mon Mar 26 17:46:19 EDT 2012 kill -USR1 6829 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6829 killed at Mon Mar 26 17:46:19 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6885 >/dev/null 2>/dev/null selfserv_9793 with PID 6885 found at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 with PID 6885 started at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2482: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 6885 at Mon Mar 26 17:46:19 EDT 2012 kill -USR1 6885 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6885 killed at Mon Mar 26 17:46:19 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6941 >/dev/null 2>/dev/null selfserv_9793 with PID 6941 found at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 with PID 6941 started at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2483: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 6941 at Mon Mar 26 17:46:19 EDT 2012 kill -USR1 6941 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6941 killed at Mon Mar 26 17:46:19 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7009 >/dev/null 2>/dev/null selfserv_9793 with PID 7009 found at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 with PID 7009 started at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2484: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7009 at Mon Mar 26 17:46:19 EDT 2012 kill -USR1 7009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7009 killed at Mon Mar 26 17:46:19 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7065 >/dev/null 2>/dev/null selfserv_9793 with PID 7065 found at Mon Mar 26 17:46:19 EDT 2012 selfserv_9793 with PID 7065 started at Mon Mar 26 17:46:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2485: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7065 at Mon Mar 26 17:46:20 EDT 2012 kill -USR1 7065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7065 killed at Mon Mar 26 17:46:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7121 >/dev/null 2>/dev/null selfserv_9793 with PID 7121 found at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 with PID 7121 started at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2486: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7121 at Mon Mar 26 17:46:20 EDT 2012 kill -USR1 7121 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7121 killed at Mon Mar 26 17:46:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7189 >/dev/null 2>/dev/null selfserv_9793 with PID 7189 found at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 with PID 7189 started at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2487: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7189 at Mon Mar 26 17:46:20 EDT 2012 kill -USR1 7189 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7189 killed at Mon Mar 26 17:46:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7245 >/dev/null 2>/dev/null selfserv_9793 with PID 7245 found at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 with PID 7245 started at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2488: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7245 at Mon Mar 26 17:46:20 EDT 2012 kill -USR1 7245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7245 killed at Mon Mar 26 17:46:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7301 >/dev/null 2>/dev/null selfserv_9793 with PID 7301 found at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 with PID 7301 started at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2489: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7301 at Mon Mar 26 17:46:20 EDT 2012 kill -USR1 7301 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7301 killed at Mon Mar 26 17:46:20 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7369 >/dev/null 2>/dev/null selfserv_9793 with PID 7369 found at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 with PID 7369 started at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2490: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7369 at Mon Mar 26 17:46:20 EDT 2012 kill -USR1 7369 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7369 killed at Mon Mar 26 17:46:20 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7425 >/dev/null 2>/dev/null selfserv_9793 with PID 7425 found at Mon Mar 26 17:46:20 EDT 2012 selfserv_9793 with PID 7425 started at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2491: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7425 at Mon Mar 26 17:46:21 EDT 2012 kill -USR1 7425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7425 killed at Mon Mar 26 17:46:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7481 >/dev/null 2>/dev/null selfserv_9793 with PID 7481 found at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 with PID 7481 started at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2492: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7481 at Mon Mar 26 17:46:21 EDT 2012 kill -USR1 7481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7481 killed at Mon Mar 26 17:46:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7549 >/dev/null 2>/dev/null selfserv_9793 with PID 7549 found at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 with PID 7549 started at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2493: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7549 at Mon Mar 26 17:46:21 EDT 2012 kill -USR1 7549 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7549 killed at Mon Mar 26 17:46:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7605 >/dev/null 2>/dev/null selfserv_9793 with PID 7605 found at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 with PID 7605 started at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2494: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7605 at Mon Mar 26 17:46:21 EDT 2012 kill -USR1 7605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7605 killed at Mon Mar 26 17:46:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7661 >/dev/null 2>/dev/null selfserv_9793 with PID 7661 found at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 with PID 7661 started at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2495: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7661 at Mon Mar 26 17:46:21 EDT 2012 kill -USR1 7661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7661 killed at Mon Mar 26 17:46:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7729 >/dev/null 2>/dev/null selfserv_9793 with PID 7729 found at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 with PID 7729 started at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2496: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7729 at Mon Mar 26 17:46:21 EDT 2012 kill -USR1 7729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7729 killed at Mon Mar 26 17:46:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7785 >/dev/null 2>/dev/null selfserv_9793 with PID 7785 found at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 with PID 7785 started at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2497: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7785 at Mon Mar 26 17:46:22 EDT 2012 kill -USR1 7785 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7785 killed at Mon Mar 26 17:46:22 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7841 >/dev/null 2>/dev/null selfserv_9793 with PID 7841 found at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 with PID 7841 started at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2498: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 7841 at Mon Mar 26 17:46:22 EDT 2012 kill -USR1 7841 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7841 killed at Mon Mar 26 17:46:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7909 >/dev/null 2>/dev/null selfserv_9793 with PID 7909 found at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 with PID 7909 started at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2499: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7909 at Mon Mar 26 17:46:22 EDT 2012 kill -USR1 7909 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7909 killed at Mon Mar 26 17:46:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 7965 >/dev/null 2>/dev/null selfserv_9793 with PID 7965 found at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 with PID 7965 started at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2500: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 7965 at Mon Mar 26 17:46:22 EDT 2012 kill -USR1 7965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 7965 killed at Mon Mar 26 17:46:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8021 >/dev/null 2>/dev/null selfserv_9793 with PID 8021 found at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 with PID 8021 started at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2501: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8021 at Mon Mar 26 17:46:22 EDT 2012 kill -USR1 8021 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8021 killed at Mon Mar 26 17:46:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8091 >/dev/null 2>/dev/null selfserv_9793 with PID 8091 found at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 with PID 8091 started at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2502: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8091 at Mon Mar 26 17:46:22 EDT 2012 kill -USR1 8091 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8091 killed at Mon Mar 26 17:46:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8153 >/dev/null 2>/dev/null selfserv_9793 with PID 8153 found at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 with PID 8153 started at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2503: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8153 at Mon Mar 26 17:46:23 EDT 2012 kill -USR1 8153 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8153 killed at Mon Mar 26 17:46:23 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8209 >/dev/null 2>/dev/null selfserv_9793 with PID 8209 found at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 with PID 8209 started at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2504: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8209 at Mon Mar 26 17:46:23 EDT 2012 kill -USR1 8209 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8209 killed at Mon Mar 26 17:46:23 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8277 >/dev/null 2>/dev/null selfserv_9793 with PID 8277 found at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 with PID 8277 started at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2505: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8277 at Mon Mar 26 17:46:23 EDT 2012 kill -USR1 8277 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8277 killed at Mon Mar 26 17:46:23 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8333 >/dev/null 2>/dev/null selfserv_9793 with PID 8333 found at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 with PID 8333 started at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2506: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8333 at Mon Mar 26 17:46:23 EDT 2012 kill -USR1 8333 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8333 killed at Mon Mar 26 17:46:23 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8389 >/dev/null 2>/dev/null selfserv_9793 with PID 8389 found at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 with PID 8389 started at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2507: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8389 at Mon Mar 26 17:46:23 EDT 2012 kill -USR1 8389 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8389 killed at Mon Mar 26 17:46:23 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8457 >/dev/null 2>/dev/null selfserv_9793 with PID 8457 found at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 with PID 8457 started at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2508: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8457 at Mon Mar 26 17:46:23 EDT 2012 kill -USR1 8457 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8457 killed at Mon Mar 26 17:46:23 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8515 >/dev/null 2>/dev/null selfserv_9793 with PID 8515 found at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 with PID 8515 started at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2509: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8515 at Mon Mar 26 17:46:24 EDT 2012 kill -USR1 8515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8515 killed at Mon Mar 26 17:46:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8572 >/dev/null 2>/dev/null selfserv_9793 with PID 8572 found at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 with PID 8572 started at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2510: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8572 at Mon Mar 26 17:46:24 EDT 2012 kill -USR1 8572 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8572 killed at Mon Mar 26 17:46:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8640 >/dev/null 2>/dev/null selfserv_9793 with PID 8640 found at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 with PID 8640 started at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2511: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8640 at Mon Mar 26 17:46:24 EDT 2012 kill -USR1 8640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8640 killed at Mon Mar 26 17:46:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8696 >/dev/null 2>/dev/null selfserv_9793 with PID 8696 found at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 with PID 8696 started at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2512: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8696 at Mon Mar 26 17:46:24 EDT 2012 kill -USR1 8696 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8696 killed at Mon Mar 26 17:46:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8752 >/dev/null 2>/dev/null selfserv_9793 with PID 8752 found at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 with PID 8752 started at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2513: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8752 at Mon Mar 26 17:46:24 EDT 2012 kill -USR1 8752 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8752 killed at Mon Mar 26 17:46:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8820 >/dev/null 2>/dev/null selfserv_9793 with PID 8820 found at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 with PID 8820 started at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2514: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8820 at Mon Mar 26 17:46:24 EDT 2012 kill -USR1 8820 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8820 killed at Mon Mar 26 17:46:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8876 >/dev/null 2>/dev/null selfserv_9793 with PID 8876 found at Mon Mar 26 17:46:25 EDT 2012 selfserv_9793 with PID 8876 started at Mon Mar 26 17:46:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2515: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 8876 at Mon Mar 26 17:46:25 EDT 2012 kill -USR1 8876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8876 killed at Mon Mar 26 17:46:25 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8932 >/dev/null 2>/dev/null selfserv_9793 with PID 8932 found at Mon Mar 26 17:46:25 EDT 2012 selfserv_9793 with PID 8932 started at Mon Mar 26 17:46:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2516: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 8932 at Mon Mar 26 17:46:25 EDT 2012 kill -USR1 8932 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8932 killed at Mon Mar 26 17:46:25 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9793 starting at Mon Mar 26 17:46:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:25 EDT 2012 selfserv_9793 with PID 9004 started at Mon Mar 26 17:46:25 EDT 2012 Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:25 EDT 2012 ssl.sh: #2517: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:25 EDT 2012 ssl.sh: #2518: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:25 EDT 2012 ssl.sh: #2519: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:25 EDT 2012 ssl.sh: #2520: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:25 EDT 2012 ssl.sh: #2521: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:25 EDT 2012 ssl.sh: #2522: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:25 EDT 2012 ssl.sh: #2523: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2524: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2525: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2526: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2527: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2528: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2529: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2530: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2531: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2532: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2533: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2534: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2535: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2536: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:26 EDT 2012 ssl.sh: #2537: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2538: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2539: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2540: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2541: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2542: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2543: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2544: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2545: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2546: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2547: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2548: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2549: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2550: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:27 EDT 2012 ssl.sh: #2551: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2552: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2553: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2554: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2555: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2556: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9004 >/dev/null 2>/dev/null selfserv_9793 with PID 9004 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2557: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 9004 at Mon Mar 26 17:46:28 EDT 2012 kill -USR1 9004 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9004 killed at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:28 EDT 2012 selfserv_9793 with PID 10448 started at Mon Mar 26 17:46:28 EDT 2012 Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2558: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2559: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2560: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2561: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2562: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:28 EDT 2012 ssl.sh: #2563: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2564: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2565: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2566: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2567: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2568: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2569: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2570: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2571: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2572: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2573: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2574: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2575: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2576: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:29 EDT 2012 ssl.sh: #2577: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2578: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2579: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2580: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2581: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2582: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2583: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2584: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2585: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2586: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2587: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2588: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2589: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2590: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:30 EDT 2012 ssl.sh: #2591: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2592: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2593: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2594: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2595: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2596: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2597: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10448 >/dev/null 2>/dev/null selfserv_9793 with PID 10448 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2598: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 10448 at Mon Mar 26 17:46:31 EDT 2012 kill -USR1 10448 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 10448 killed at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11869 >/dev/null 2>/dev/null selfserv_9793 with PID 11869 found at Mon Mar 26 17:46:31 EDT 2012 selfserv_9793 with PID 11869 started at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 11869 at Mon Mar 26 17:46:31 EDT 2012 kill -USR1 11869 ./ssl.sh: line 207: 11869 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11869 killed at Mon Mar 26 17:46:31 EDT 2012 selfserv_9793 starting at Mon Mar 26 17:46:31 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:31 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:31 EDT 2012 selfserv_9793 with PID 11911 started at Mon Mar 26 17:46:31 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2599: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2600: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2601: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:31 EDT 2012 ssl.sh: #2602: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2603: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2604: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2605: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2606: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2607: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2608: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2609: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2610: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2611: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2612: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2613: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:32 EDT 2012 ssl.sh: #2614: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2615: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2616: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2617: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2618: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2619: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2620: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2621: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2622: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2623: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2624: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2625: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2626: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:33 EDT 2012 ssl.sh: #2627: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2628: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2629: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2630: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2631: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2632: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2633: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2634: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2635: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2636: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2637: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2638: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11911 >/dev/null 2>/dev/null selfserv_9793 with PID 11911 found at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: #2639: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 11911 at Mon Mar 26 17:46:34 EDT 2012 kill -USR1 11911 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11911 killed at Mon Mar 26 17:46:34 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:34 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:34 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:34 EDT 2012 selfserv_9793 with PID 13331 started at Mon Mar 26 17:46:34 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2640: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2641: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2642: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2643: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2644: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2645: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2646: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2647: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2648: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2649: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2650: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:35 EDT 2012 ssl.sh: #2651: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2652: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2653: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2654: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2655: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2656: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2657: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2658: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2659: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2660: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2661: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2662: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2663: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2664: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:36 EDT 2012 ssl.sh: #2665: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2666: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2667: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2668: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2669: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2670: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2671: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2672: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2673: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2674: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2675: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2676: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2677: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:37 EDT 2012 ssl.sh: #2678: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2679: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13331 >/dev/null 2>/dev/null selfserv_9793 with PID 13331 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2680: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 13331 at Mon Mar 26 17:46:38 EDT 2012 kill -USR1 13331 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13331 killed at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:38 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:38 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14758 >/dev/null 2>/dev/null selfserv_9793 with PID 14758 found at Mon Mar 26 17:46:38 EDT 2012 selfserv_9793 with PID 14758 started at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 14758 at Mon Mar 26 17:46:38 EDT 2012 kill -USR1 14758 ./ssl.sh: line 207: 14758 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14758 killed at Mon Mar 26 17:46:38 EDT 2012 selfserv_9793 starting at Mon Mar 26 17:46:38 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:38 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 selfserv_9793 with PID 14800 started at Mon Mar 26 17:46:38 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2681: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2682: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2683: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2684: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2685: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2686: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2687: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2688: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:38 EDT 2012 ssl.sh: #2689: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2690: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2691: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2692: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2693: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2694: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2695: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2696: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2697: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2698: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2699: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2700: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2701: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:39 EDT 2012 ssl.sh: #2702: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2703: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2704: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2705: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2706: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2707: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2708: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2709: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2710: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2711: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2712: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2713: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:40 EDT 2012 ssl.sh: #2714: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2715: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2716: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2717: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2718: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2719: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2720: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14800 >/dev/null 2>/dev/null selfserv_9793 with PID 14800 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2721: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 14800 at Mon Mar 26 17:46:41 EDT 2012 kill -USR1 14800 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14800 killed at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:41 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:41 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:41 EDT 2012 selfserv_9793 with PID 16234 started at Mon Mar 26 17:46:41 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2722: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2723: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2724: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2725: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:41 EDT 2012 ssl.sh: #2726: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2727: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2728: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2729: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2730: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2731: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2732: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2733: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2734: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2735: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2736: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2737: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2738: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:42 EDT 2012 ssl.sh: #2739: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2740: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2741: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2742: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2743: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2744: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2745: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2746: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2747: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2748: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2749: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2750: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2751: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:43 EDT 2012 ssl.sh: #2752: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2753: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2754: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2755: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2756: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2757: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2758: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2759: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2760: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2761: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16234 >/dev/null 2>/dev/null selfserv_9793 with PID 16234 found at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: #2762: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16234 at Mon Mar 26 17:46:44 EDT 2012 kill -USR1 16234 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16234 killed at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:44 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17654 >/dev/null 2>/dev/null selfserv_9793 with PID 17654 found at Mon Mar 26 17:46:44 EDT 2012 selfserv_9793 with PID 17654 started at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 17654 at Mon Mar 26 17:46:44 EDT 2012 kill -USR1 17654 ./ssl.sh: line 207: 17654 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17654 killed at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: SSL Cipher Coverage - server bypass/client bypass =============================== selfserv_9793 starting at Mon Mar 26 17:46:44 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:44 EDT 2012 selfserv_9793 with PID 17702 started at Mon Mar 26 17:46:44 EDT 2012 ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c A -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2763: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c B -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2764: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c C -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2765: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c D -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2766: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c E -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2767: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c F -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2768: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2769: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:45 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2770: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2771: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2772: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2773: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2774: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2775: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2776: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2777: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2778: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2779: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2780: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2781: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2782: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2783: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2784: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2785: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2786: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2787: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2788: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2789: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2790: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2791: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2792: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2793: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2794: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2795: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 17702 >/dev/null 2>/dev/null selfserv_9793 with PID 17702 found at Mon Mar 26 17:46:47 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2796: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 17702 at Mon Mar 26 17:46:47 EDT 2012 kill -USR1 17702 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17702 killed at Mon Mar 26 17:46:47 EDT 2012 ssl.sh: SSL Client Authentication - server bypass/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19288 >/dev/null 2>/dev/null selfserv_9793 with PID 19288 found at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 with PID 19288 started at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2797: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 19288 at Mon Mar 26 17:46:48 EDT 2012 kill -USR1 19288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19288 killed at Mon Mar 26 17:46:48 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19345 >/dev/null 2>/dev/null selfserv_9793 with PID 19345 found at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 with PID 19345 started at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2798: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 19345 at Mon Mar 26 17:46:48 EDT 2012 kill -USR1 19345 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19345 killed at Mon Mar 26 17:46:48 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19402 >/dev/null 2>/dev/null selfserv_9793 with PID 19402 found at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 with PID 19402 started at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2799: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 19402 at Mon Mar 26 17:46:48 EDT 2012 kill -USR1 19402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19402 killed at Mon Mar 26 17:46:48 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19459 >/dev/null 2>/dev/null selfserv_9793 with PID 19459 found at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 with PID 19459 started at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2800: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 19459 at Mon Mar 26 17:46:48 EDT 2012 kill -USR1 19459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19459 killed at Mon Mar 26 17:46:48 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19516 >/dev/null 2>/dev/null selfserv_9793 with PID 19516 found at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 with PID 19516 started at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2801: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 19516 at Mon Mar 26 17:46:48 EDT 2012 kill -USR1 19516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19516 killed at Mon Mar 26 17:46:48 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19573 >/dev/null 2>/dev/null selfserv_9793 with PID 19573 found at Mon Mar 26 17:46:48 EDT 2012 selfserv_9793 with PID 19573 started at Mon Mar 26 17:46:48 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2802: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 19573 at Mon Mar 26 17:46:48 EDT 2012 kill -USR1 19573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19573 killed at Mon Mar 26 17:46:48 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19630 >/dev/null 2>/dev/null selfserv_9793 with PID 19630 found at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 with PID 19630 started at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2803: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 19630 at Mon Mar 26 17:46:49 EDT 2012 kill -USR1 19630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19630 killed at Mon Mar 26 17:46:49 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19687 >/dev/null 2>/dev/null selfserv_9793 with PID 19687 found at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 with PID 19687 started at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2804: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 19687 at Mon Mar 26 17:46:49 EDT 2012 kill -USR1 19687 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19687 killed at Mon Mar 26 17:46:49 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19744 >/dev/null 2>/dev/null selfserv_9793 with PID 19744 found at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 with PID 19744 started at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2805: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 19744 at Mon Mar 26 17:46:49 EDT 2012 kill -USR1 19744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19744 killed at Mon Mar 26 17:46:49 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19801 >/dev/null 2>/dev/null selfserv_9793 with PID 19801 found at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 with PID 19801 started at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2806: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 19801 at Mon Mar 26 17:46:49 EDT 2012 kill -USR1 19801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19801 killed at Mon Mar 26 17:46:49 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19858 >/dev/null 2>/dev/null selfserv_9793 with PID 19858 found at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 with PID 19858 started at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2807: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 19858 at Mon Mar 26 17:46:49 EDT 2012 kill -USR1 19858 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19858 killed at Mon Mar 26 17:46:49 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19915 >/dev/null 2>/dev/null selfserv_9793 with PID 19915 found at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 with PID 19915 started at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2808: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 19915 at Mon Mar 26 17:46:49 EDT 2012 kill -USR1 19915 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19915 killed at Mon Mar 26 17:46:49 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19972 >/dev/null 2>/dev/null selfserv_9793 with PID 19972 found at Mon Mar 26 17:46:49 EDT 2012 selfserv_9793 with PID 19972 started at Mon Mar 26 17:46:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2809: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 19972 at Mon Mar 26 17:46:50 EDT 2012 kill -USR1 19972 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19972 killed at Mon Mar 26 17:46:50 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20029 >/dev/null 2>/dev/null selfserv_9793 with PID 20029 found at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 with PID 20029 started at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2810: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20029 at Mon Mar 26 17:46:50 EDT 2012 kill -USR1 20029 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20029 killed at Mon Mar 26 17:46:50 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20086 >/dev/null 2>/dev/null selfserv_9793 with PID 20086 found at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 with PID 20086 started at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2811: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20086 at Mon Mar 26 17:46:50 EDT 2012 kill -USR1 20086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20086 killed at Mon Mar 26 17:46:50 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20143 >/dev/null 2>/dev/null selfserv_9793 with PID 20143 found at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 with PID 20143 started at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2812: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20143 at Mon Mar 26 17:46:50 EDT 2012 kill -USR1 20143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20143 killed at Mon Mar 26 17:46:50 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20200 >/dev/null 2>/dev/null selfserv_9793 with PID 20200 found at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 with PID 20200 started at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2813: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20200 at Mon Mar 26 17:46:50 EDT 2012 kill -USR1 20200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20200 killed at Mon Mar 26 17:46:50 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20257 >/dev/null 2>/dev/null selfserv_9793 with PID 20257 found at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 with PID 20257 started at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2814: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20257 at Mon Mar 26 17:46:50 EDT 2012 kill -USR1 20257 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20257 killed at Mon Mar 26 17:46:50 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20314 >/dev/null 2>/dev/null selfserv_9793 with PID 20314 found at Mon Mar 26 17:46:50 EDT 2012 selfserv_9793 with PID 20314 started at Mon Mar 26 17:46:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2815: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20314 at Mon Mar 26 17:46:51 EDT 2012 kill -USR1 20314 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20314 killed at Mon Mar 26 17:46:51 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20371 >/dev/null 2>/dev/null selfserv_9793 with PID 20371 found at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 with PID 20371 started at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2816: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20371 at Mon Mar 26 17:46:51 EDT 2012 kill -USR1 20371 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20371 killed at Mon Mar 26 17:46:51 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20428 >/dev/null 2>/dev/null selfserv_9793 with PID 20428 found at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 with PID 20428 started at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2817: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20428 at Mon Mar 26 17:46:51 EDT 2012 kill -USR1 20428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20428 killed at Mon Mar 26 17:46:51 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20485 >/dev/null 2>/dev/null selfserv_9793 with PID 20485 found at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 with PID 20485 started at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2818: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20485 at Mon Mar 26 17:46:51 EDT 2012 kill -USR1 20485 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20485 killed at Mon Mar 26 17:46:51 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20542 >/dev/null 2>/dev/null selfserv_9793 with PID 20542 found at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 with PID 20542 started at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2819: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20542 at Mon Mar 26 17:46:51 EDT 2012 kill -USR1 20542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20542 killed at Mon Mar 26 17:46:51 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20599 >/dev/null 2>/dev/null selfserv_9793 with PID 20599 found at Mon Mar 26 17:46:51 EDT 2012 selfserv_9793 with PID 20599 started at Mon Mar 26 17:46:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2820: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20599 at Mon Mar 26 17:46:51 EDT 2012 kill -USR1 20599 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20599 killed at Mon Mar 26 17:46:51 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20724 >/dev/null 2>/dev/null selfserv_9793 with PID 20724 found at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 with PID 20724 started at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2821: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20724 at Mon Mar 26 17:46:52 EDT 2012 kill -USR1 20724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20724 killed at Mon Mar 26 17:46:52 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20787 >/dev/null 2>/dev/null selfserv_9793 with PID 20787 found at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 with PID 20787 started at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2822: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20787 at Mon Mar 26 17:46:52 EDT 2012 kill -USR1 20787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20787 killed at Mon Mar 26 17:46:52 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20850 >/dev/null 2>/dev/null selfserv_9793 with PID 20850 found at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 with PID 20850 started at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2823: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20850 at Mon Mar 26 17:46:52 EDT 2012 kill -USR1 20850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20850 killed at Mon Mar 26 17:46:52 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20913 >/dev/null 2>/dev/null selfserv_9793 with PID 20913 found at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 with PID 20913 started at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2824: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 20913 at Mon Mar 26 17:46:52 EDT 2012 kill -USR1 20913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20913 killed at Mon Mar 26 17:46:52 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9793 starting at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 20976 >/dev/null 2>/dev/null selfserv_9793 with PID 20976 found at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 with PID 20976 started at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #2825: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 20976 at Mon Mar 26 17:46:52 EDT 2012 kill -USR1 20976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 20976 killed at Mon Mar 26 17:46:52 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9793 starting at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21039 >/dev/null 2>/dev/null selfserv_9793 with PID 21039 found at Mon Mar 26 17:46:52 EDT 2012 selfserv_9793 with PID 21039 started at Mon Mar 26 17:46:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2826: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 21039 at Mon Mar 26 17:46:52 EDT 2012 kill -USR1 21039 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21039 killed at Mon Mar 26 17:46:52 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9793 starting at Mon Mar 26 17:46:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21102 >/dev/null 2>/dev/null selfserv_9793 with PID 21102 found at Mon Mar 26 17:46:53 EDT 2012 selfserv_9793 with PID 21102 started at Mon Mar 26 17:46:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2827: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 21102 at Mon Mar 26 17:46:53 EDT 2012 kill -USR1 21102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21102 killed at Mon Mar 26 17:46:53 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:46:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21165 >/dev/null 2>/dev/null selfserv_9793 with PID 21165 found at Mon Mar 26 17:46:53 EDT 2012 selfserv_9793 with PID 21165 started at Mon Mar 26 17:46:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #2828: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 21165 at Mon Mar 26 17:46:53 EDT 2012 kill -USR1 21165 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21165 killed at Mon Mar 26 17:46:53 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9793 starting at Mon Mar 26 17:46:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21228 >/dev/null 2>/dev/null selfserv_9793 with PID 21228 found at Mon Mar 26 17:46:53 EDT 2012 selfserv_9793 with PID 21228 started at Mon Mar 26 17:46:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #2829: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 21228 at Mon Mar 26 17:46:53 EDT 2012 kill -USR1 21228 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21228 killed at Mon Mar 26 17:46:53 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9793 starting at Mon Mar 26 17:46:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21291 >/dev/null 2>/dev/null selfserv_9793 with PID 21291 found at Mon Mar 26 17:46:53 EDT 2012 selfserv_9793 with PID 21291 started at Mon Mar 26 17:46:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2830: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 21291 at Mon Mar 26 17:46:53 EDT 2012 kill -USR1 21291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21291 killed at Mon Mar 26 17:46:53 EDT 2012 ssl.sh: SSL Stress Test - server bypass/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:46:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21640 >/dev/null 2>/dev/null selfserv_9793 with PID 21640 found at Mon Mar 26 17:46:54 EDT 2012 selfserv_9793 with PID 21640 started at Mon Mar 26 17:46:54 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:46:54 EDT 2012 ssl.sh: #2831: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 21640 at Mon Mar 26 17:46:54 EDT 2012 kill -USR1 21640 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21640 killed at Mon Mar 26 17:46:54 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:46:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21716 >/dev/null 2>/dev/null selfserv_9793 with PID 21716 found at Mon Mar 26 17:46:54 EDT 2012 selfserv_9793 with PID 21716 started at Mon Mar 26 17:46:54 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:54 EDT 2012 ssl.sh: #2832: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 21716 at Mon Mar 26 17:46:54 EDT 2012 kill -USR1 21716 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21716 killed at Mon Mar 26 17:46:54 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:46:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21792 >/dev/null 2>/dev/null selfserv_9793 with PID 21792 found at Mon Mar 26 17:46:55 EDT 2012 selfserv_9793 with PID 21792 started at Mon Mar 26 17:46:55 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:55 EDT 2012 ssl.sh: #2833: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 21792 at Mon Mar 26 17:46:55 EDT 2012 kill -USR1 21792 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21792 killed at Mon Mar 26 17:46:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:46:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21868 >/dev/null 2>/dev/null selfserv_9793 with PID 21868 found at Mon Mar 26 17:46:55 EDT 2012 selfserv_9793 with PID 21868 started at Mon Mar 26 17:46:55 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:55 EDT 2012 ssl.sh: #2834: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 21868 at Mon Mar 26 17:46:55 EDT 2012 kill -USR1 21868 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21868 killed at Mon Mar 26 17:46:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:46:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21944 >/dev/null 2>/dev/null selfserv_9793 with PID 21944 found at Mon Mar 26 17:46:55 EDT 2012 selfserv_9793 with PID 21944 started at Mon Mar 26 17:46:55 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:56 EDT 2012 ssl.sh: #2835: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 21944 at Mon Mar 26 17:46:56 EDT 2012 kill -USR1 21944 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21944 killed at Mon Mar 26 17:46:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:46:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22020 >/dev/null 2>/dev/null selfserv_9793 with PID 22020 found at Mon Mar 26 17:46:56 EDT 2012 selfserv_9793 with PID 22020 started at Mon Mar 26 17:46:56 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:57 EDT 2012 ssl.sh: #2836: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22020 at Mon Mar 26 17:46:57 EDT 2012 kill -USR1 22020 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22020 killed at Mon Mar 26 17:46:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:46:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22096 >/dev/null 2>/dev/null selfserv_9793 with PID 22096 found at Mon Mar 26 17:46:57 EDT 2012 selfserv_9793 with PID 22096 started at Mon Mar 26 17:46:57 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:58 EDT 2012 ssl.sh: #2837: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22096 at Mon Mar 26 17:46:58 EDT 2012 kill -USR1 22096 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22096 killed at Mon Mar 26 17:46:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:46:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22172 >/dev/null 2>/dev/null selfserv_9793 with PID 22172 found at Mon Mar 26 17:46:58 EDT 2012 selfserv_9793 with PID 22172 started at Mon Mar 26 17:46:58 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:58 EDT 2012 ssl.sh: #2838: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22172 at Mon Mar 26 17:46:58 EDT 2012 kill -USR1 22172 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22172 killed at Mon Mar 26 17:46:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9793 starting at Mon Mar 26 17:46:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22254 >/dev/null 2>/dev/null selfserv_9793 with PID 22254 found at Mon Mar 26 17:46:58 EDT 2012 selfserv_9793 with PID 22254 started at Mon Mar 26 17:46:58 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:59 EDT 2012 ssl.sh: #2839: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22254 at Mon Mar 26 17:46:59 EDT 2012 kill -USR1 22254 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22254 killed at Mon Mar 26 17:46:59 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:46:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:46:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22351 >/dev/null 2>/dev/null selfserv_9793 with PID 22351 found at Mon Mar 26 17:46:59 EDT 2012 selfserv_9793 with PID 22351 started at Mon Mar 26 17:46:59 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:59 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:47:00 EDT 2012 ssl.sh: #2840: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22351 at Mon Mar 26 17:47:00 EDT 2012 kill -USR1 22351 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22351 killed at Mon Mar 26 17:47:00 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22426 >/dev/null 2>/dev/null selfserv_9793 with PID 22426 found at Mon Mar 26 17:47:00 EDT 2012 selfserv_9793 with PID 22426 started at Mon Mar 26 17:47:00 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:00 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:47:00 EDT 2012 ssl.sh: #2841: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22426 at Mon Mar 26 17:47:00 EDT 2012 kill -USR1 22426 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22426 killed at Mon Mar 26 17:47:00 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22501 >/dev/null 2>/dev/null selfserv_9793 with PID 22501 found at Mon Mar 26 17:47:00 EDT 2012 selfserv_9793 with PID 22501 started at Mon Mar 26 17:47:00 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:00 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:47:00 EDT 2012 ssl.sh: #2842: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22501 at Mon Mar 26 17:47:00 EDT 2012 kill -USR1 22501 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22501 killed at Mon Mar 26 17:47:01 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22576 >/dev/null 2>/dev/null selfserv_9793 with PID 22576 found at Mon Mar 26 17:47:01 EDT 2012 selfserv_9793 with PID 22576 started at Mon Mar 26 17:47:01 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:01 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:47:01 EDT 2012 ssl.sh: #2843: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22576 at Mon Mar 26 17:47:01 EDT 2012 kill -USR1 22576 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22576 killed at Mon Mar 26 17:47:01 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22652 >/dev/null 2>/dev/null selfserv_9793 with PID 22652 found at Mon Mar 26 17:47:01 EDT 2012 selfserv_9793 with PID 22652 started at Mon Mar 26 17:47:01 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:01 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:47:01 EDT 2012 ssl.sh: #2844: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22652 at Mon Mar 26 17:47:01 EDT 2012 kill -USR1 22652 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22652 killed at Mon Mar 26 17:47:01 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:47:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22728 >/dev/null 2>/dev/null selfserv_9793 with PID 22728 found at Mon Mar 26 17:47:01 EDT 2012 selfserv_9793 with PID 22728 started at Mon Mar 26 17:47:01 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:01 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:47:01 EDT 2012 ssl.sh: #2845: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22728 at Mon Mar 26 17:47:01 EDT 2012 kill -USR1 22728 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22728 killed at Mon Mar 26 17:47:01 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22804 >/dev/null 2>/dev/null selfserv_9793 with PID 22804 found at Mon Mar 26 17:47:01 EDT 2012 selfserv_9793 with PID 22804 started at Mon Mar 26 17:47:01 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:01 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:47:01 EDT 2012 ssl.sh: #2846: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22804 at Mon Mar 26 17:47:01 EDT 2012 kill -USR1 22804 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22804 killed at Mon Mar 26 17:47:01 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:47:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22880 >/dev/null 2>/dev/null selfserv_9793 with PID 22880 found at Mon Mar 26 17:47:02 EDT 2012 selfserv_9793 with PID 22880 started at Mon Mar 26 17:47:02 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:02 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:47:02 EDT 2012 ssl.sh: #2847: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22880 at Mon Mar 26 17:47:02 EDT 2012 kill -USR1 22880 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22880 killed at Mon Mar 26 17:47:02 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9793 starting at Mon Mar 26 17:47:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22962 >/dev/null 2>/dev/null selfserv_9793 with PID 22962 found at Mon Mar 26 17:47:02 EDT 2012 selfserv_9793 with PID 22962 started at Mon Mar 26 17:47:02 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:02 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:47:02 EDT 2012 ssl.sh: #2848: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 22962 at Mon Mar 26 17:47:02 EDT 2012 kill -USR1 22962 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22962 killed at Mon Mar 26 17:47:02 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9793 starting at Mon Mar 26 17:47:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 23044 >/dev/null 2>/dev/null selfserv_9793 with PID 23044 found at Mon Mar 26 17:47:02 EDT 2012 selfserv_9793 with PID 23044 started at Mon Mar 26 17:47:02 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:02 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:47:03 EDT 2012 ssl.sh: #2849: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 23044 at Mon Mar 26 17:47:03 EDT 2012 kill -USR1 23044 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 23044 killed at Mon Mar 26 17:47:03 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass =============================== selfserv_9793 starting at Mon Mar 26 17:47:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:03 EDT 2012 selfserv_9793 with PID 23197 started at Mon Mar 26 17:47:03 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2850: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2851: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2852: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2853: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2854: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2855: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2856: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2857: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2858: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2859: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2860: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2861: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2862: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2863: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c c -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2864: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c d -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2865: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c e -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2866: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c f -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2867: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c g -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2868: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c i -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2869: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c j -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2870: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c k -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2871: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c l -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2872: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c m -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2873: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c n -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2874: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c v -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2875: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c y -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2876: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 23197 >/dev/null 2>/dev/null selfserv_9793 with PID 23197 found at Mon Mar 26 17:47:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -c z -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2877: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9793 with PID 23197 at Mon Mar 26 17:47:06 EDT 2012 kill -USR1 23197 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 23197 killed at Mon Mar 26 17:47:06 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24668 >/dev/null 2>/dev/null selfserv_9793 with PID 24668 found at Mon Mar 26 17:47:06 EDT 2012 selfserv_9793 with PID 24668 started at Mon Mar 26 17:47:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2878: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 24668 at Mon Mar 26 17:47:06 EDT 2012 kill -USR1 24668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24668 killed at Mon Mar 26 17:47:06 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:47:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24725 >/dev/null 2>/dev/null selfserv_9793 with PID 24725 found at Mon Mar 26 17:47:06 EDT 2012 selfserv_9793 with PID 24725 started at Mon Mar 26 17:47:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2879: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 24725 at Mon Mar 26 17:47:06 EDT 2012 kill -USR1 24725 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24725 killed at Mon Mar 26 17:47:06 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24782 >/dev/null 2>/dev/null selfserv_9793 with PID 24782 found at Mon Mar 26 17:47:06 EDT 2012 selfserv_9793 with PID 24782 started at Mon Mar 26 17:47:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2880: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 24782 at Mon Mar 26 17:47:06 EDT 2012 kill -USR1 24782 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24782 killed at Mon Mar 26 17:47:06 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24839 >/dev/null 2>/dev/null selfserv_9793 with PID 24839 found at Mon Mar 26 17:47:06 EDT 2012 selfserv_9793 with PID 24839 started at Mon Mar 26 17:47:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2881: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 24839 at Mon Mar 26 17:47:07 EDT 2012 kill -USR1 24839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24839 killed at Mon Mar 26 17:47:07 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24896 >/dev/null 2>/dev/null selfserv_9793 with PID 24896 found at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 with PID 24896 started at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2882: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 24896 at Mon Mar 26 17:47:07 EDT 2012 kill -USR1 24896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24896 killed at Mon Mar 26 17:47:07 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24953 >/dev/null 2>/dev/null selfserv_9793 with PID 24953 found at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 with PID 24953 started at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2883: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 24953 at Mon Mar 26 17:47:07 EDT 2012 kill -USR1 24953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24953 killed at Mon Mar 26 17:47:07 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25010 >/dev/null 2>/dev/null selfserv_9793 with PID 25010 found at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 with PID 25010 started at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2884: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25010 at Mon Mar 26 17:47:07 EDT 2012 kill -USR1 25010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25010 killed at Mon Mar 26 17:47:07 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25067 >/dev/null 2>/dev/null selfserv_9793 with PID 25067 found at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 with PID 25067 started at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2885: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25067 at Mon Mar 26 17:47:07 EDT 2012 kill -USR1 25067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25067 killed at Mon Mar 26 17:47:07 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25124 >/dev/null 2>/dev/null selfserv_9793 with PID 25124 found at Mon Mar 26 17:47:07 EDT 2012 selfserv_9793 with PID 25124 started at Mon Mar 26 17:47:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2886: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25124 at Mon Mar 26 17:47:07 EDT 2012 kill -USR1 25124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25124 killed at Mon Mar 26 17:47:07 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25181 >/dev/null 2>/dev/null selfserv_9793 with PID 25181 found at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 with PID 25181 started at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2887: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25181 at Mon Mar 26 17:47:08 EDT 2012 kill -USR1 25181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25181 killed at Mon Mar 26 17:47:08 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25238 >/dev/null 2>/dev/null selfserv_9793 with PID 25238 found at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 with PID 25238 started at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2888: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25238 at Mon Mar 26 17:47:08 EDT 2012 kill -USR1 25238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25238 killed at Mon Mar 26 17:47:08 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25295 >/dev/null 2>/dev/null selfserv_9793 with PID 25295 found at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 with PID 25295 started at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2889: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25295 at Mon Mar 26 17:47:08 EDT 2012 kill -USR1 25295 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25295 killed at Mon Mar 26 17:47:08 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25352 >/dev/null 2>/dev/null selfserv_9793 with PID 25352 found at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 with PID 25352 started at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2890: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25352 at Mon Mar 26 17:47:08 EDT 2012 kill -USR1 25352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25352 killed at Mon Mar 26 17:47:08 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25409 >/dev/null 2>/dev/null selfserv_9793 with PID 25409 found at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 with PID 25409 started at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2891: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25409 at Mon Mar 26 17:47:08 EDT 2012 kill -USR1 25409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25409 killed at Mon Mar 26 17:47:08 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25466 >/dev/null 2>/dev/null selfserv_9793 with PID 25466 found at Mon Mar 26 17:47:08 EDT 2012 selfserv_9793 with PID 25466 started at Mon Mar 26 17:47:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2892: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25466 at Mon Mar 26 17:47:09 EDT 2012 kill -USR1 25466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25466 killed at Mon Mar 26 17:47:09 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25523 >/dev/null 2>/dev/null selfserv_9793 with PID 25523 found at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 with PID 25523 started at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2893: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25523 at Mon Mar 26 17:47:09 EDT 2012 kill -USR1 25523 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25523 killed at Mon Mar 26 17:47:09 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25580 >/dev/null 2>/dev/null selfserv_9793 with PID 25580 found at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 with PID 25580 started at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2894: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25580 at Mon Mar 26 17:47:09 EDT 2012 kill -USR1 25580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25580 killed at Mon Mar 26 17:47:09 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25637 >/dev/null 2>/dev/null selfserv_9793 with PID 25637 found at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 with PID 25637 started at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2895: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25637 at Mon Mar 26 17:47:09 EDT 2012 kill -USR1 25637 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25637 killed at Mon Mar 26 17:47:09 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25697 >/dev/null 2>/dev/null selfserv_9793 with PID 25697 found at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 with PID 25697 started at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2896: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25697 at Mon Mar 26 17:47:09 EDT 2012 kill -USR1 25697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25697 killed at Mon Mar 26 17:47:09 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25754 >/dev/null 2>/dev/null selfserv_9793 with PID 25754 found at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 with PID 25754 started at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2897: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25754 at Mon Mar 26 17:47:09 EDT 2012 kill -USR1 25754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25754 killed at Mon Mar 26 17:47:09 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25811 >/dev/null 2>/dev/null selfserv_9793 with PID 25811 found at Mon Mar 26 17:47:09 EDT 2012 selfserv_9793 with PID 25811 started at Mon Mar 26 17:47:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2898: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25811 at Mon Mar 26 17:47:10 EDT 2012 kill -USR1 25811 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25811 killed at Mon Mar 26 17:47:10 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25868 >/dev/null 2>/dev/null selfserv_9793 with PID 25868 found at Mon Mar 26 17:47:10 EDT 2012 selfserv_9793 with PID 25868 started at Mon Mar 26 17:47:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2899: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25868 at Mon Mar 26 17:47:10 EDT 2012 kill -USR1 25868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25868 killed at Mon Mar 26 17:47:10 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:47:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25925 >/dev/null 2>/dev/null selfserv_9793 with PID 25925 found at Mon Mar 26 17:47:10 EDT 2012 selfserv_9793 with PID 25925 started at Mon Mar 26 17:47:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2900: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 25925 at Mon Mar 26 17:47:10 EDT 2012 kill -USR1 25925 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25925 killed at Mon Mar 26 17:47:10 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25982 >/dev/null 2>/dev/null selfserv_9793 with PID 25982 found at Mon Mar 26 17:47:10 EDT 2012 selfserv_9793 with PID 25982 started at Mon Mar 26 17:47:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2901: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 25982 at Mon Mar 26 17:47:10 EDT 2012 kill -USR1 25982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25982 killed at Mon Mar 26 17:47:10 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:47:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26417 >/dev/null 2>/dev/null selfserv_9793 with PID 26417 found at Mon Mar 26 17:47:11 EDT 2012 selfserv_9793 with PID 26417 started at Mon Mar 26 17:47:11 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:47:11 EDT 2012 ssl.sh: #2902: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26417 at Mon Mar 26 17:47:11 EDT 2012 kill -USR1 26417 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26417 killed at Mon Mar 26 17:47:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:47:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26493 >/dev/null 2>/dev/null selfserv_9793 with PID 26493 found at Mon Mar 26 17:47:11 EDT 2012 selfserv_9793 with PID 26493 started at Mon Mar 26 17:47:11 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:47:11 EDT 2012 ssl.sh: #2903: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26493 at Mon Mar 26 17:47:11 EDT 2012 kill -USR1 26493 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26493 killed at Mon Mar 26 17:47:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:47:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26569 >/dev/null 2>/dev/null selfserv_9793 with PID 26569 found at Mon Mar 26 17:47:12 EDT 2012 selfserv_9793 with PID 26569 started at Mon Mar 26 17:47:12 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:47:12 EDT 2012 ssl.sh: #2904: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26569 at Mon Mar 26 17:47:12 EDT 2012 kill -USR1 26569 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26569 killed at Mon Mar 26 17:47:12 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:47:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26645 >/dev/null 2>/dev/null selfserv_9793 with PID 26645 found at Mon Mar 26 17:47:12 EDT 2012 selfserv_9793 with PID 26645 started at Mon Mar 26 17:47:12 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:47:12 EDT 2012 ssl.sh: #2905: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26645 at Mon Mar 26 17:47:12 EDT 2012 kill -USR1 26645 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26645 killed at Mon Mar 26 17:47:12 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:47:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26721 >/dev/null 2>/dev/null selfserv_9793 with PID 26721 found at Mon Mar 26 17:47:13 EDT 2012 selfserv_9793 with PID 26721 started at Mon Mar 26 17:47:13 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:47:13 EDT 2012 ssl.sh: #2906: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26721 at Mon Mar 26 17:47:13 EDT 2012 kill -USR1 26721 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26721 killed at Mon Mar 26 17:47:13 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:47:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26797 >/dev/null 2>/dev/null selfserv_9793 with PID 26797 found at Mon Mar 26 17:47:13 EDT 2012 selfserv_9793 with PID 26797 started at Mon Mar 26 17:47:13 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:47:14 EDT 2012 ssl.sh: #2907: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26797 at Mon Mar 26 17:47:14 EDT 2012 kill -USR1 26797 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26797 killed at Mon Mar 26 17:47:14 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:47:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26873 >/dev/null 2>/dev/null selfserv_9793 with PID 26873 found at Mon Mar 26 17:47:14 EDT 2012 selfserv_9793 with PID 26873 started at Mon Mar 26 17:47:14 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:47:15 EDT 2012 ssl.sh: #2908: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26873 at Mon Mar 26 17:47:15 EDT 2012 kill -USR1 26873 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26873 killed at Mon Mar 26 17:47:15 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26978 >/dev/null 2>/dev/null selfserv_9793 with PID 26978 found at Mon Mar 26 17:47:15 EDT 2012 selfserv_9793 with PID 26978 started at Mon Mar 26 17:47:15 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:47:15 EDT 2012 ssl.sh: #2909: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26978 at Mon Mar 26 17:47:15 EDT 2012 kill -USR1 26978 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26978 killed at Mon Mar 26 17:47:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27053 >/dev/null 2>/dev/null selfserv_9793 with PID 27053 found at Mon Mar 26 17:47:15 EDT 2012 selfserv_9793 with PID 27053 started at Mon Mar 26 17:47:15 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:47:16 EDT 2012 ssl.sh: #2910: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27053 at Mon Mar 26 17:47:16 EDT 2012 kill -USR1 27053 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27053 killed at Mon Mar 26 17:47:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27128 >/dev/null 2>/dev/null selfserv_9793 with PID 27128 found at Mon Mar 26 17:47:16 EDT 2012 selfserv_9793 with PID 27128 started at Mon Mar 26 17:47:16 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:47:16 EDT 2012 ssl.sh: #2911: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27128 at Mon Mar 26 17:47:16 EDT 2012 kill -USR1 27128 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27128 killed at Mon Mar 26 17:47:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27204 >/dev/null 2>/dev/null selfserv_9793 with PID 27204 found at Mon Mar 26 17:47:16 EDT 2012 selfserv_9793 with PID 27204 started at Mon Mar 26 17:47:16 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:47:16 EDT 2012 ssl.sh: #2912: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27204 at Mon Mar 26 17:47:16 EDT 2012 kill -USR1 27204 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27204 killed at Mon Mar 26 17:47:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:47:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27280 >/dev/null 2>/dev/null selfserv_9793 with PID 27280 found at Mon Mar 26 17:47:16 EDT 2012 selfserv_9793 with PID 27280 started at Mon Mar 26 17:47:16 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:47:16 EDT 2012 ssl.sh: #2913: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27280 at Mon Mar 26 17:47:16 EDT 2012 kill -USR1 27280 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27280 killed at Mon Mar 26 17:47:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:47:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27356 >/dev/null 2>/dev/null selfserv_9793 with PID 27356 found at Mon Mar 26 17:47:17 EDT 2012 selfserv_9793 with PID 27356 started at Mon Mar 26 17:47:17 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:47:17 EDT 2012 ssl.sh: #2914: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27356 at Mon Mar 26 17:47:17 EDT 2012 kill -USR1 27356 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27356 killed at Mon Mar 26 17:47:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:47:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:47:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27432 >/dev/null 2>/dev/null selfserv_9793 with PID 27432 found at Mon Mar 26 17:47:17 EDT 2012 selfserv_9793 with PID 27432 started at Mon Mar 26 17:47:17 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:47:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:47:17 EDT 2012 ssl.sh: #2915: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27432 at Mon Mar 26 17:47:17 EDT 2012 kill -USR1 27432 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27432 killed at Mon Mar 26 17:47:17 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) TIMESTAMP ssl END: Mon Mar 26 17:47:17 EDT 2012 Running tests for ocsp TIMESTAMP ocsp BEGIN: Mon Mar 26 17:47:17 EDT 2012 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Mon Mar 26 17:47:17 EDT 2012 Running tests for pkits TIMESTAMP pkits BEGIN: Mon Mar 26 17:47:17 EDT 2012 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Mon Mar 26 17:47:17 EDT 2012 Running tests for chains TIMESTAMP chains BEGIN: Mon Mar 26 17:47:17 EDT 2012 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2916: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174718 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2917: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2918: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2919: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174719 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2920: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2921: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2922: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2923: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174720 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2924: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #2925: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174721 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2926: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #2927: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2928: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2929: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2930: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 326174722 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2931: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der chains.sh: #2932: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2933: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #2934: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #2935: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174719 (0x137107ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:47:18 2012 Not After : Sun Mar 26 21:47:18 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:83:5a:fa:92:80:30:66:3c:40:1d:2a:74:06:f9:2d: 87:11:3f:39:40:13:ec:a4:3a:05:f2:71:82:84:c2:de: 2c:28:16:88:79:9a:3d:50:8d:23:bb:36:65:eb:09:f7: 11:d1:f2:32:fc:26:07:33:05:61:ca:ce:ca:2f:0a:02: 3c:bf:0a:a7:4c:b0:ae:a7:7a:4a:1a:cf:12:64:fa:2e: b0:8d:72:e8:f0:62:6f:3a:14:c9:94:ee:1b:80:8f:80: 6f:f3:50:cb:70:22:ad:56:4b:23:f3:e5:8a:32:06:90: b9:0c:f9:46:55:df:b3:93:92:7d:d4:0a:b1:08:da:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: e6:ff:fa:86:7d:2a:24:e3:f8:c1:73:0c:ce:28:d6:8b: eb:ea:53:db:71:df:b5:b3:a8:42:e9:da:6a:57:9c:b6: 52:a7:cf:e4:38:f8:ea:ef:7e:d4:49:bc:f2:d5:33:a6: fd:a4:e2:36:bd:2a:09:80:6a:ab:64:e8:4f:c7:c3:eb: 52:05:64:e1:15:5d:4a:bd:9c:d0:f7:a1:d4:ba:04:1f: 9f:39:a9:92:a1:0c:9a:49:b7:f7:6c:33:fe:fc:b1:80: 88:bd:cf:37:ae:d1:c0:9a:e9:30:49:89:84:5c:ac:61: da:4f:6c:39:b8:96:34:cb:0f:54:38:13:e5:de:04:c6 Fingerprint (MD5): 44:88:C2:FC:BB:49:11:81:70:8B:1A:B0:AB:C3:73:CA Fingerprint (SHA1): 45:54:B5:05:00:69:2E:C0:5D:02:C9:45:E1:B8:D7:13:F5:CC:B0:A4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2936: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174718 (0x137107fe) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:47:18 2012 Not After : Sun Mar 26 21:47:18 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:69:5d:7b:8a:14:4d:2a:52:4b:d6:bb:9f:13:ac:95: 34:75:30:cf:33:07:2b:b9:ae:4e:de:d7:b6:04:0d:43: ae:ec:9d:7c:43:d0:97:a4:4e:9e:bd:3e:e3:d9:4c:b2: b0:8a:61:2c:14:af:69:05:bc:8e:5f:95:b1:f4:e0:15: 58:0e:a1:86:f8:93:e7:9d:c2:57:dd:36:37:f3:cf:2a: 11:a7:b3:c0:83:90:2c:3f:f0:08:d5:8f:43:78:56:0c: c1:fd:16:e4:1c:f4:df:2e:3a:2e:9a:40:9a:84:93:f6: 19:cc:39:79:11:3a:79:f3:7e:61:a2:7f:d0:4e:95:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 41:09:17:75:03:e2:81:1b:ff:fa:3e:96:46:77:c2:c6: b7:c3:30:ff:79:2a:b4:75:c5:f5:89:67:b2:7d:8e:99: 7b:e3:ea:6f:f2:60:60:40:6d:bc:22:eb:2e:32:19:ce: 62:84:f9:2e:0c:4d:f3:5c:70:f9:34:42:f7:da:39:a3: 42:02:b5:55:dc:e2:e0:b8:3b:32:51:bd:fe:9e:47:8d: f4:fd:6a:a0:4e:9b:4c:dc:42:80:68:80:56:0b:ed:c0: 1f:f9:f4:62:c7:4c:88:fb:4a:de:e1:80:07:ce:ab:74: ff:86:13:82:f3:46:5d:c9:b0:97:2a:29:03:c2:d2:0b Fingerprint (MD5): 8D:36:B0:0A:C4:5C:34:68:C0:E9:94:9B:CA:FD:A5:93 Fingerprint (SHA1): 5A:00:F1:1E:F5:7D:0B:5D:F0:9A:D7:5C:ED:F4:03:AE:F8:8C:53:DE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2937: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2938: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #2939: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #2940: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174718 (0x137107fe) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:47:18 2012 Not After : Sun Mar 26 21:47:18 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:69:5d:7b:8a:14:4d:2a:52:4b:d6:bb:9f:13:ac:95: 34:75:30:cf:33:07:2b:b9:ae:4e:de:d7:b6:04:0d:43: ae:ec:9d:7c:43:d0:97:a4:4e:9e:bd:3e:e3:d9:4c:b2: b0:8a:61:2c:14:af:69:05:bc:8e:5f:95:b1:f4:e0:15: 58:0e:a1:86:f8:93:e7:9d:c2:57:dd:36:37:f3:cf:2a: 11:a7:b3:c0:83:90:2c:3f:f0:08:d5:8f:43:78:56:0c: c1:fd:16:e4:1c:f4:df:2e:3a:2e:9a:40:9a:84:93:f6: 19:cc:39:79:11:3a:79:f3:7e:61:a2:7f:d0:4e:95:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 41:09:17:75:03:e2:81:1b:ff:fa:3e:96:46:77:c2:c6: b7:c3:30:ff:79:2a:b4:75:c5:f5:89:67:b2:7d:8e:99: 7b:e3:ea:6f:f2:60:60:40:6d:bc:22:eb:2e:32:19:ce: 62:84:f9:2e:0c:4d:f3:5c:70:f9:34:42:f7:da:39:a3: 42:02:b5:55:dc:e2:e0:b8:3b:32:51:bd:fe:9e:47:8d: f4:fd:6a:a0:4e:9b:4c:dc:42:80:68:80:56:0b:ed:c0: 1f:f9:f4:62:c7:4c:88:fb:4a:de:e1:80:07:ce:ab:74: ff:86:13:82:f3:46:5d:c9:b0:97:2a:29:03:c2:d2:0b Fingerprint (MD5): 8D:36:B0:0A:C4:5C:34:68:C0:E9:94:9B:CA:FD:A5:93 Fingerprint (SHA1): 5A:00:F1:1E:F5:7D:0B:5D:F0:9A:D7:5C:ED:F4:03:AE:F8:8C:53:DE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2941: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174719 (0x137107ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:47:18 2012 Not After : Sun Mar 26 21:47:18 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:83:5a:fa:92:80:30:66:3c:40:1d:2a:74:06:f9:2d: 87:11:3f:39:40:13:ec:a4:3a:05:f2:71:82:84:c2:de: 2c:28:16:88:79:9a:3d:50:8d:23:bb:36:65:eb:09:f7: 11:d1:f2:32:fc:26:07:33:05:61:ca:ce:ca:2f:0a:02: 3c:bf:0a:a7:4c:b0:ae:a7:7a:4a:1a:cf:12:64:fa:2e: b0:8d:72:e8:f0:62:6f:3a:14:c9:94:ee:1b:80:8f:80: 6f:f3:50:cb:70:22:ad:56:4b:23:f3:e5:8a:32:06:90: b9:0c:f9:46:55:df:b3:93:92:7d:d4:0a:b1:08:da:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: e6:ff:fa:86:7d:2a:24:e3:f8:c1:73:0c:ce:28:d6:8b: eb:ea:53:db:71:df:b5:b3:a8:42:e9:da:6a:57:9c:b6: 52:a7:cf:e4:38:f8:ea:ef:7e:d4:49:bc:f2:d5:33:a6: fd:a4:e2:36:bd:2a:09:80:6a:ab:64:e8:4f:c7:c3:eb: 52:05:64:e1:15:5d:4a:bd:9c:d0:f7:a1:d4:ba:04:1f: 9f:39:a9:92:a1:0c:9a:49:b7:f7:6c:33:fe:fc:b1:80: 88:bd:cf:37:ae:d1:c0:9a:e9:30:49:89:84:5c:ac:61: da:4f:6c:39:b8:96:34:cb:0f:54:38:13:e5:de:04:c6 Fingerprint (MD5): 44:88:C2:FC:BB:49:11:81:70:8B:1A:B0:AB:C3:73:CA Fingerprint (SHA1): 45:54:B5:05:00:69:2E:C0:5D:02:C9:45:E1:B8:D7:13:F5:CC:B0:A4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2942: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #2943: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #2944: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2945: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2946: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2947: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174719 (0x137107ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:47:18 2012 Not After : Sun Mar 26 21:47:18 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:83:5a:fa:92:80:30:66:3c:40:1d:2a:74:06:f9:2d: 87:11:3f:39:40:13:ec:a4:3a:05:f2:71:82:84:c2:de: 2c:28:16:88:79:9a:3d:50:8d:23:bb:36:65:eb:09:f7: 11:d1:f2:32:fc:26:07:33:05:61:ca:ce:ca:2f:0a:02: 3c:bf:0a:a7:4c:b0:ae:a7:7a:4a:1a:cf:12:64:fa:2e: b0:8d:72:e8:f0:62:6f:3a:14:c9:94:ee:1b:80:8f:80: 6f:f3:50:cb:70:22:ad:56:4b:23:f3:e5:8a:32:06:90: b9:0c:f9:46:55:df:b3:93:92:7d:d4:0a:b1:08:da:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: e6:ff:fa:86:7d:2a:24:e3:f8:c1:73:0c:ce:28:d6:8b: eb:ea:53:db:71:df:b5:b3:a8:42:e9:da:6a:57:9c:b6: 52:a7:cf:e4:38:f8:ea:ef:7e:d4:49:bc:f2:d5:33:a6: fd:a4:e2:36:bd:2a:09:80:6a:ab:64:e8:4f:c7:c3:eb: 52:05:64:e1:15:5d:4a:bd:9c:d0:f7:a1:d4:ba:04:1f: 9f:39:a9:92:a1:0c:9a:49:b7:f7:6c:33:fe:fc:b1:80: 88:bd:cf:37:ae:d1:c0:9a:e9:30:49:89:84:5c:ac:61: da:4f:6c:39:b8:96:34:cb:0f:54:38:13:e5:de:04:c6 Fingerprint (MD5): 44:88:C2:FC:BB:49:11:81:70:8B:1A:B0:AB:C3:73:CA Fingerprint (SHA1): 45:54:B5:05:00:69:2E:C0:5D:02:C9:45:E1:B8:D7:13:F5:CC:B0:A4 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2948: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174719 (0x137107ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:47:18 2012 Not After : Sun Mar 26 21:47:18 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:83:5a:fa:92:80:30:66:3c:40:1d:2a:74:06:f9:2d: 87:11:3f:39:40:13:ec:a4:3a:05:f2:71:82:84:c2:de: 2c:28:16:88:79:9a:3d:50:8d:23:bb:36:65:eb:09:f7: 11:d1:f2:32:fc:26:07:33:05:61:ca:ce:ca:2f:0a:02: 3c:bf:0a:a7:4c:b0:ae:a7:7a:4a:1a:cf:12:64:fa:2e: b0:8d:72:e8:f0:62:6f:3a:14:c9:94:ee:1b:80:8f:80: 6f:f3:50:cb:70:22:ad:56:4b:23:f3:e5:8a:32:06:90: b9:0c:f9:46:55:df:b3:93:92:7d:d4:0a:b1:08:da:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: e6:ff:fa:86:7d:2a:24:e3:f8:c1:73:0c:ce:28:d6:8b: eb:ea:53:db:71:df:b5:b3:a8:42:e9:da:6a:57:9c:b6: 52:a7:cf:e4:38:f8:ea:ef:7e:d4:49:bc:f2:d5:33:a6: fd:a4:e2:36:bd:2a:09:80:6a:ab:64:e8:4f:c7:c3:eb: 52:05:64:e1:15:5d:4a:bd:9c:d0:f7:a1:d4:ba:04:1f: 9f:39:a9:92:a1:0c:9a:49:b7:f7:6c:33:fe:fc:b1:80: 88:bd:cf:37:ae:d1:c0:9a:e9:30:49:89:84:5c:ac:61: da:4f:6c:39:b8:96:34:cb:0f:54:38:13:e5:de:04:c6 Fingerprint (MD5): 44:88:C2:FC:BB:49:11:81:70:8B:1A:B0:AB:C3:73:CA Fingerprint (SHA1): 45:54:B5:05:00:69:2E:C0:5D:02:C9:45:E1:B8:D7:13:F5:CC:B0:A4 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2949: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #2950: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #2951: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2952: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2953: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2954: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174718 (0x137107fe) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:47:18 2012 Not After : Sun Mar 26 21:47:18 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:69:5d:7b:8a:14:4d:2a:52:4b:d6:bb:9f:13:ac:95: 34:75:30:cf:33:07:2b:b9:ae:4e:de:d7:b6:04:0d:43: ae:ec:9d:7c:43:d0:97:a4:4e:9e:bd:3e:e3:d9:4c:b2: b0:8a:61:2c:14:af:69:05:bc:8e:5f:95:b1:f4:e0:15: 58:0e:a1:86:f8:93:e7:9d:c2:57:dd:36:37:f3:cf:2a: 11:a7:b3:c0:83:90:2c:3f:f0:08:d5:8f:43:78:56:0c: c1:fd:16:e4:1c:f4:df:2e:3a:2e:9a:40:9a:84:93:f6: 19:cc:39:79:11:3a:79:f3:7e:61:a2:7f:d0:4e:95:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 41:09:17:75:03:e2:81:1b:ff:fa:3e:96:46:77:c2:c6: b7:c3:30:ff:79:2a:b4:75:c5:f5:89:67:b2:7d:8e:99: 7b:e3:ea:6f:f2:60:60:40:6d:bc:22:eb:2e:32:19:ce: 62:84:f9:2e:0c:4d:f3:5c:70:f9:34:42:f7:da:39:a3: 42:02:b5:55:dc:e2:e0:b8:3b:32:51:bd:fe:9e:47:8d: f4:fd:6a:a0:4e:9b:4c:dc:42:80:68:80:56:0b:ed:c0: 1f:f9:f4:62:c7:4c:88:fb:4a:de:e1:80:07:ce:ab:74: ff:86:13:82:f3:46:5d:c9:b0:97:2a:29:03:c2:d2:0b Fingerprint (MD5): 8D:36:B0:0A:C4:5C:34:68:C0:E9:94:9B:CA:FD:A5:93 Fingerprint (SHA1): 5A:00:F1:1E:F5:7D:0B:5D:F0:9A:D7:5C:ED:F4:03:AE:F8:8C:53:DE Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2955: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174718 (0x137107fe) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:47:18 2012 Not After : Sun Mar 26 21:47:18 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:69:5d:7b:8a:14:4d:2a:52:4b:d6:bb:9f:13:ac:95: 34:75:30:cf:33:07:2b:b9:ae:4e:de:d7:b6:04:0d:43: ae:ec:9d:7c:43:d0:97:a4:4e:9e:bd:3e:e3:d9:4c:b2: b0:8a:61:2c:14:af:69:05:bc:8e:5f:95:b1:f4:e0:15: 58:0e:a1:86:f8:93:e7:9d:c2:57:dd:36:37:f3:cf:2a: 11:a7:b3:c0:83:90:2c:3f:f0:08:d5:8f:43:78:56:0c: c1:fd:16:e4:1c:f4:df:2e:3a:2e:9a:40:9a:84:93:f6: 19:cc:39:79:11:3a:79:f3:7e:61:a2:7f:d0:4e:95:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 41:09:17:75:03:e2:81:1b:ff:fa:3e:96:46:77:c2:c6: b7:c3:30:ff:79:2a:b4:75:c5:f5:89:67:b2:7d:8e:99: 7b:e3:ea:6f:f2:60:60:40:6d:bc:22:eb:2e:32:19:ce: 62:84:f9:2e:0c:4d:f3:5c:70:f9:34:42:f7:da:39:a3: 42:02:b5:55:dc:e2:e0:b8:3b:32:51:bd:fe:9e:47:8d: f4:fd:6a:a0:4e:9b:4c:dc:42:80:68:80:56:0b:ed:c0: 1f:f9:f4:62:c7:4c:88:fb:4a:de:e1:80:07:ce:ab:74: ff:86:13:82:f3:46:5d:c9:b0:97:2a:29:03:c2:d2:0b Fingerprint (MD5): 8D:36:B0:0A:C4:5C:34:68:C0:E9:94:9B:CA:FD:A5:93 Fingerprint (SHA1): 5A:00:F1:1E:F5:7D:0B:5D:F0:9A:D7:5C:ED:F4:03:AE:F8:8C:53:DE Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2956: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #2957: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174723 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2958: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #2959: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #2960: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174724 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2961: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #2962: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #2963: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174725 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2964: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #2965: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #2966: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174726 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2967: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #2968: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #2969: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174727 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2970: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #2971: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #2972: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174728 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2973: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #2974: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #2975: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174729 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2976: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #2977: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #2978: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174730 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2979: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #2980: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #2981: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174731 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2982: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #2983: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #2984: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2985: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 326174732 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2986: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der chains.sh: #2987: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 326174733 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2988: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der chains.sh: #2989: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 326174734 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2990: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der chains.sh: #2991: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #2992: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #2993: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2994: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 326174735 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2995: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der chains.sh: #2996: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 326174736 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2997: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der chains.sh: #2998: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 326174737 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2999: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der chains.sh: #3000: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #3001: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #3002: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3003: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 326174738 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3004: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der chains.sh: #3005: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 326174739 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3006: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der chains.sh: #3007: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 326174740 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3008: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der chains.sh: #3009: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #3010: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #3011: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3012: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 326174741 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3013: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der chains.sh: #3014: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 326174742 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3015: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der chains.sh: #3016: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 326174743 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3017: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der chains.sh: #3018: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #3019: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3020: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3021: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 326174744 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3022: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der chains.sh: #3023: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3024: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3025: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174745 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3026: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3027: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174723 (0x13710803) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 26 21:47:20 2012 Not After : Sun Mar 26 21:47:20 2062 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:12:7e:0d:a6:2d:57:ce:29:4a:16:17:9c:f7:bb:bd: 5b:1b:fb:d8:97:40:97:20:22:44:ac:98:33:0f:c2:1e: b4:25:62:3e:8d:78:dd:db:21:03:eb:af:18:a5:76:2f: 19:de:d8:5a:14:91:6e:e9:34:a9:2e:00:28:e6:1b:14: 84:e9:53:a6:71:cc:a9:dc:87:74:5d:b2:78:ad:4b:ee: 96:3f:74:6d:c0:e2:d2:c7:66:21:a2:fb:5e:d5:e4:0a: 0e:ca:e2:6f:7d:55:7f:cf:66:cf:1f:25:b7:98:57:4b: a9:d4:86:48:be:bd:69:e1:f3:12:21:7c:5e:29:83:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:48:a6:6b:5f:57:a9:90:5f:60:ad:2b:0a:92:ed:aa: df:26:09:3c:ab:ca:b1:47:4f:80:bc:8c:f8:bc:d3:e0: f5:76:8d:09:6b:17:dc:2d:ae:4f:e5:72:09:65:c9:b1: ab:31:ff:24:a0:47:fd:c3:cf:a5:24:75:b8:9f:b9:14: 19:52:15:15:85:42:61:87:84:eb:b1:37:42:a7:b1:13: 3f:c2:fb:c5:9d:d1:d0:e0:f9:9c:e3:77:e0:8d:23:4b: 13:4d:47:aa:09:f0:11:4a:bf:c3:41:eb:e5:28:22:66: a3:c6:ce:0d:e8:a6:99:b2:2a:0c:d2:1d:c8:1c:d6:e1 Fingerprint (MD5): 99:4B:87:E6:10:7B:8D:7C:7B:4B:90:2E:D1:E2:15:F6 Fingerprint (SHA1): 8F:61:43:77:EC:B0:1E:E6:DE:38:44:35:72:0A:21:31:44:7E:FA:27 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3028: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174724 (0x13710804) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 26 21:47:20 2012 Not After : Sun Mar 26 21:47:20 2062 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:e4:d2:f5:ed:cc:6b:fd:43:9d:e2:62:ab:6f:40:d4: 01:47:58:ef:da:5b:3e:66:7c:56:91:83:db:4c:75:04: da:7c:5b:85:10:5c:e7:e7:c7:09:ce:2d:eb:02:48:2b: 11:29:b5:97:9b:e5:b9:57:08:66:e2:61:d0:07:e7:e4: 04:aa:11:35:5d:fa:c0:42:cb:3c:28:ac:c6:ae:ef:bf: e2:f2:21:96:47:9d:93:93:60:18:47:db:ae:75:fb:c9: 03:2a:38:f4:03:32:a4:2d:80:9a:5e:c8:ed:a9:ca:17: 01:c5:32:fb:dd:f1:24:18:90:87:ed:68:f9:a8:41:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: cf:bf:d6:e0:7e:16:13:1f:c3:9d:6e:12:76:44:8e:d7: 11:49:9f:39:3b:70:12:1a:a7:02:14:87:18:68:c6:87: 82:4e:be:ad:38:62:e8:61:9c:96:73:55:5d:39:94:fe: 73:9c:d8:3a:34:9d:b3:56:65:42:bb:4e:67:c0:0c:cc: 6e:f6:90:e2:8c:6f:93:5b:96:43:1f:61:e6:d6:c6:79: db:2d:00:12:04:1e:78:0e:c9:89:04:0d:9c:9b:a0:38: 4d:c1:1d:74:cb:07:aa:d6:7b:8a:9d:2f:fd:49:5e:96: 22:b9:ce:f9:41:60:a7:d2:44:c2:2e:b3:d5:97:95:23 Fingerprint (MD5): BA:76:09:CE:21:6A:8B:58:00:2A:B3:BE:17:08:BF:10 Fingerprint (SHA1): C6:79:72:B5:BD:20:0F:31:1B:3C:DA:8F:C6:71:E7:E6:5E:D0:6F:35 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3029: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174725 (0x13710805) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 26 21:47:20 2012 Not After : Sun Mar 26 21:47:20 2062 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:43:fc:11:70:c7:d6:87:8b:3b:2b:b1:bd:ce:b9:bb: b7:3d:6e:80:d7:f7:ae:2a:fa:16:77:57:6e:bc:92:47: 7f:ad:dd:49:53:53:f9:06:8a:97:be:40:ec:9b:92:74: b8:db:b5:0e:54:0a:85:3c:bf:d9:3a:88:23:73:7b:a8: 7a:0d:2c:7d:31:f3:ec:90:cc:5f:6a:ff:6a:2e:7d:49: 4c:20:24:8e:cd:03:4d:4e:f5:b5:2b:1b:97:20:b5:12: 1f:cd:51:7d:e1:f5:fc:5d:b3:62:9d:4b:5d:0a:02:da: cd:86:8c:2a:b1:eb:bb:15:1f:23:00:c1:fc:51:f2:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 86:be:c1:bc:32:bd:88:f7:cf:84:a2:15:89:33:4a:4e: 9b:3f:a8:46:31:53:d5:12:d3:88:46:c5:19:bf:60:92: 63:75:8c:2c:3e:ff:d0:d1:da:07:20:d7:be:27:8c:9b: 91:fc:2e:a2:ef:03:5f:11:8b:71:3f:89:8d:93:67:36: 10:ac:09:c8:ad:46:d0:ee:ea:14:05:f3:47:ab:6d:e1: 73:fa:63:e5:ae:34:53:5d:8b:1d:93:c5:87:37:e4:4c: 3a:bd:9c:13:a3:11:86:2d:97:5d:87:8c:75:a0:fd:99: 6b:c8:9d:bc:b9:6c:58:32:75:5b:c0:00:bb:b8:50:71 Fingerprint (MD5): 7F:E7:76:DD:36:A6:CE:E1:F0:A5:D4:D1:C7:C2:96:8E Fingerprint (SHA1): DF:FE:DC:1B:2E:D4:3A:3C:9F:95:C0:58:82:2F:2E:FE:75:EF:FA:F3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3030: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174726 (0x13710806) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 26 21:47:20 2012 Not After : Sun Mar 26 21:47:20 2062 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:3f:04:17:dc:26:fb:ce:43:88:9b:45:7a:4e:81:0c: f1:e5:70:4a:d4:ab:f0:56:8c:e7:7a:20:51:90:bb:52: 31:4f:f5:08:87:8a:7d:44:d3:eb:fc:20:29:e6:67:b7: 45:d1:4d:02:ce:6f:f2:30:8c:82:87:82:55:48:82:5b: 55:bc:c7:40:21:46:1f:4a:18:e5:6a:e6:28:21:5b:ff: 2f:33:12:b4:8b:51:0d:7d:bd:6a:c2:8b:05:77:77:35: d9:d6:fc:11:af:ed:ba:27:e7:e4:07:57:da:27:38:55: 33:85:af:84:2b:c9:f1:2d:9e:4b:e1:05:15:69:df:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:e8:b1:d8:c7:fa:e7:c8:1f:21:0d:46:17:0d:f3:39: 24:c0:b2:ee:8a:8f:bd:5a:ba:4f:e6:b7:6d:35:1d:97: 6a:fc:86:66:c7:60:e5:35:f9:a1:bf:6f:7e:72:ca:f3: 86:6f:b4:ca:90:b0:01:68:4c:ab:a1:7d:55:fd:d0:6c: 9a:6a:15:07:01:e5:cf:a3:54:14:b2:ce:88:5c:97:6b: 7b:d0:9e:46:ab:39:64:80:5d:49:12:6b:cc:d5:49:78: 85:09:7d:52:10:92:8b:46:ed:38:d2:ce:8e:62:cd:4e: 85:ab:57:c3:42:a9:f0:dc:ab:16:c7:7a:5f:51:81:5d Fingerprint (MD5): F9:E7:FC:F0:EC:20:A7:88:B4:2B:67:D4:4F:73:F5:AB Fingerprint (SHA1): CA:11:51:15:67:D2:68:D4:88:E3:FE:D8:7C:04:5D:86:9A:F2:3D:08 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3031: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174727 (0x13710807) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 26 21:47:21 2012 Not After : Sun Mar 26 21:47:21 2062 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:d8:cd:ac:a2:de:5d:14:dd:39:fd:80:07:dc:57:2b: 07:fb:c5:ac:67:12:1c:bb:1b:48:a7:86:5b:7b:cb:b1: 8a:4d:54:0e:a5:a5:3a:c4:7b:77:85:a9:16:22:f3:9e: d7:20:69:80:42:13:ee:21:c1:46:d7:a2:a7:09:a8:5a: 5e:11:ec:cf:f2:89:13:61:85:7b:48:ed:1b:34:1d:a8: 75:53:b4:0d:6b:07:f9:2d:82:5c:b1:c2:d0:0c:2b:50: 4b:40:bc:09:d1:39:a6:76:e1:c5:b9:57:d3:f5:14:f9: 70:f0:91:c6:23:1d:e1:8c:63:10:3f:85:9d:96:1e:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 86:39:ad:c9:25:f1:9d:fc:e9:22:b6:02:dd:69:2f:82: 44:24:df:d7:69:ad:19:6a:d7:1c:a9:28:54:cb:d8:3f: 72:ad:f2:b8:44:82:38:4b:cf:36:fa:68:f1:8b:2a:13: e0:89:f7:ef:71:b7:a8:61:64:85:56:34:81:46:da:e8: 8d:0c:9b:b9:8a:0c:ef:81:1e:5f:0a:e7:50:c5:68:d4: 78:6e:c6:96:eb:de:8f:bc:97:9c:61:06:a5:d3:32:af: 37:9b:b8:e9:3c:48:5f:61:e9:8b:be:32:79:88:bf:02: 71:71:b7:fe:9b:a7:6c:73:38:a0:36:13:28:9c:04:6e Fingerprint (MD5): DF:47:B7:A4:85:2C:E1:C0:98:F5:00:5C:FA:A8:D0:7A Fingerprint (SHA1): 01:E0:2C:8C:ED:32:D0:A1:95:A8:26:11:11:69:E6:C7:F7:B2:0C:26 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3032: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174728 (0x13710808) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 26 21:47:21 2012 Not After : Sun Mar 26 21:47:21 2062 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:cf:25:5b:31:c3:27:0a:35:99:7b:ef:62:18:3d:29: 83:24:25:9a:8b:ff:ff:31:24:2a:2c:cf:70:ee:cf:e7: 38:c9:7f:1f:2e:3c:46:a3:2a:8a:7c:60:6b:05:7d:ae: 3d:1b:d7:3b:e9:ab:41:c4:9a:32:27:ec:5b:bf:8d:78: 31:10:d4:07:25:6a:8e:d1:d6:18:4a:58:db:30:24:7a: 2c:1b:c5:ca:3e:1b:90:1d:de:db:5d:ac:eb:d9:cf:6a: 03:b0:36:dd:f6:8a:41:41:7d:3a:78:66:2a:81:87:c9: 8c:62:24:5d:d4:0e:fd:bf:5b:d0:1f:2a:c5:c4:78:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 55:3e:23:f3:8f:e6:b8:67:51:88:1d:a7:98:ac:cb:d4: 08:db:29:63:ce:dc:77:5f:32:4c:9a:d4:e9:97:6a:36: 2f:10:64:d7:3b:3f:c7:98:64:f6:b0:bb:a1:b4:7f:cd: ab:5d:cf:1d:ac:5b:0d:0c:b4:69:23:48:7b:78:db:e1: 6a:72:44:37:87:1e:5c:7e:78:ba:f0:54:2d:e9:ab:0b: d2:24:28:19:0d:fe:bc:5f:89:7f:50:32:78:2a:9e:31: 22:5a:f8:8e:4f:0a:5b:2e:05:fd:26:8f:05:6e:9e:7c: 6f:75:60:80:1c:73:33:70:35:97:0b:3a:7d:b8:0e:9f Fingerprint (MD5): 5F:6D:45:CD:CB:D2:4B:A5:8D:12:F5:E3:47:FD:DC:BD Fingerprint (SHA1): 38:DD:EF:89:D6:2E:0C:8A:84:E0:0E:E6:3F:E3:4C:65:49:20:4F:7F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3033: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174729 (0x13710809) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 26 21:47:21 2012 Not After : Sun Mar 26 21:47:21 2062 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:35:bf:e4:75:ee:64:bc:27:39:47:7d:83:69:d9:b1: c5:5b:10:5f:84:fc:5f:05:b2:fd:25:f4:23:f0:4e:fc: 25:dc:50:66:ae:fb:4e:9b:22:45:2c:f0:61:c3:c3:02: ce:85:b3:20:3e:5b:b7:05:00:11:27:be:10:d7:00:e6: 2d:4e:05:bc:8b:ca:57:6c:39:2f:e7:e8:f5:3a:a6:f1: ba:ab:2b:31:e1:e7:e8:6f:05:d6:fd:94:be:f0:23:fa: d7:8f:de:f0:e4:b7:cc:c0:f5:5c:d0:63:38:e7:eb:4a: 5b:7d:12:26:f6:ed:87:ec:85:4e:c9:31:9e:e1:75:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 72:0d:60:35:4a:2a:18:ec:37:db:e5:71:da:3d:e2:06: 11:4b:eb:d3:7e:db:12:a0:57:6b:8c:7f:d2:52:a5:8a: 33:9a:72:d6:43:93:cd:6a:a4:b9:e5:3c:3d:28:01:4f: b7:b6:4a:70:ae:18:8d:c8:12:d0:14:be:d0:af:11:ed: 6c:1a:29:da:1d:d0:9c:5b:52:0b:a8:e5:6e:4d:11:0b: 45:2d:d7:ac:b8:61:8a:1f:03:c2:53:5e:87:2c:f1:98: 82:04:33:ef:f1:2d:90:6d:43:6e:c8:fd:95:05:df:da: 0c:52:d0:b9:03:57:12:7f:d8:be:b3:24:a2:c9:eb:7a Fingerprint (MD5): B9:1B:9B:CA:B2:BB:BE:E5:64:1B:81:DC:15:AB:B6:B7 Fingerprint (SHA1): 14:12:DD:6A:70:F5:69:E0:52:4F:84:E3:57:72:33:4F:09:C1:9B:6E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3034: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174730 (0x1371080a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 26 21:47:21 2012 Not After : Sun Mar 26 21:47:21 2062 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:85:91:59:19:98:66:54:0d:04:90:f8:31:2c:ed:e8: 36:84:6f:09:3d:a3:e5:25:c7:0d:67:62:4f:e4:60:40: 7e:fd:74:d5:91:7f:39:95:90:15:8e:33:c5:86:98:81: e1:d8:37:21:e6:83:28:0a:dc:f6:e3:ba:d1:83:90:83: 58:3f:74:c6:f3:96:f2:c6:34:51:76:e4:be:75:02:99: 38:fa:da:4c:56:82:88:94:d9:9d:f4:d3:38:83:25:67: 07:f5:9d:1d:49:ff:b2:db:6a:e7:30:c9:15:4e:51:ad: 84:db:bf:6f:3d:38:97:1b:26:61:fe:59:37:f4:c3:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a7:98:6c:1b:da:17:e8:e9:b1:71:f2:f6:8d:32:68:d5: 3a:f7:7f:da:58:68:f9:a4:3f:58:2e:5f:6f:99:4e:97: 73:1f:c6:b0:e2:11:d8:18:d4:c2:4c:ca:8c:54:5d:1e: 28:8d:81:b3:c2:dc:4d:bc:04:b0:33:e7:65:0c:b6:3d: a1:46:52:e0:75:81:3a:0f:2a:16:4d:7c:90:05:de:5f: c6:d9:39:96:d1:5d:ea:b0:61:ec:87:68:96:01:41:eb: ea:8f:83:4d:1f:8a:73:1c:55:03:87:44:79:2e:02:6d: ee:85:da:32:3c:6f:cc:56:77:95:bc:2a:1e:f5:89:e6 Fingerprint (MD5): 65:4F:EE:23:F6:68:A2:4E:36:FC:0F:33:37:DA:07:45 Fingerprint (SHA1): F5:61:29:1A:2A:34:A3:61:7C:21:0C:B8:B4:9D:60:4E:76:D3:0B:61 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3035: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174731 (0x1371080b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 26 21:47:21 2012 Not After : Sun Mar 26 21:47:21 2062 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:a8:ec:d5:1b:ba:47:29:5b:dc:fc:6e:1a:db:18:f8: ed:ab:17:79:5f:6d:45:a4:7d:bd:6f:e7:ce:e0:2e:11: 1f:8a:03:3c:03:69:4a:ad:1c:8e:76:76:ae:08:db:dc: 03:8c:83:12:4a:90:0a:5c:c0:50:a8:04:dc:93:79:3f: 95:f6:40:eb:21:e4:b8:e8:68:67:99:09:22:12:43:cd: 2b:53:2b:4b:fb:7d:76:39:18:22:79:55:fa:58:af:a5: 4e:10:81:fe:58:45:1d:01:d7:14:b5:95:9c:6d:45:72: 4b:88:05:46:c6:57:a5:32:2e:d6:fd:34:c9:05:4a:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: af:79:24:05:fd:71:d6:74:29:4f:e3:58:e8:93:19:02: 51:6d:c8:b8:9c:66:c4:08:f5:21:c3:1c:fd:f8:fb:af: 86:20:e4:8e:3d:0b:f1:30:ff:c2:a4:9c:51:76:f1:83: 2e:7e:94:67:41:24:f2:a4:ee:a6:0c:4b:44:a3:ea:a3: 4b:d6:e4:75:57:f7:71:8f:77:4b:b3:ba:cd:c2:00:47: 14:34:bb:af:e9:02:48:32:c9:cb:c7:5d:5a:52:96:31: d4:1e:77:45:04:44:38:1d:12:90:7e:e5:eb:59:19:9d: 66:7c:f3:58:d7:80:0f:ee:3d:39:70:a8:2d:2d:93:06 Fingerprint (MD5): E4:2E:D4:A7:FD:5E:F9:7D:28:9D:F4:06:C6:CE:CC:CE Fingerprint (SHA1): 05:D6:31:A6:A5:A6:B6:78:8B:FD:EE:F1:F4:B2:0B:7F:09:F3:8B:89 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3036: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3037: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174746 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3038: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3039: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3040: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3041: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174747 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3042: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3043: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3044: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3045: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174748 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3046: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3047: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3048: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3049: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174749 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3050: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #3051: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3052: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174746 (0x1371081a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:24 2012 Not After : Sun Mar 26 21:47:24 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:d2:4c:c8:89:72:67:0d:66:18:25:39:07:1b:11:5a: 8f:ad:56:d0:49:00:39:87:8f:3a:81:67:0f:5e:eb:06: e6:a8:1a:6b:5a:1b:19:a2:8f:5a:99:64:4b:13:bf:20: ca:cb:0f:10:05:e2:5e:49:a2:b8:2a:5a:a0:33:03:aa: 46:75:91:f8:5f:ea:4d:e8:6b:79:2e:35:ff:d1:cb:81: e2:9d:55:cc:6c:06:08:3b:1a:9c:ba:63:67:66:d9:ae: 49:ba:ea:74:9f:d4:20:a4:23:62:b1:dc:b5:6d:93:c8: 26:b5:a0:53:1d:f0:29:5b:15:dd:5e:6b:4a:3f:12:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:a9:b9:7c:c9:55:62:95:5c:13:16:02:bc:1d:18:da: 22:b4:1f:d3:a3:54:ac:47:e2:2f:69:51:b3:66:b5:2c: 6a:14:ff:02:a6:f7:a3:5c:43:a3:bb:cd:44:1a:35:ee: c5:a1:95:5d:95:e2:10:2f:7b:48:e4:db:09:e4:69:88: 85:b2:62:ca:36:6e:dd:6e:57:22:40:89:e0:f9:fe:a0: b6:cd:d6:c4:fb:4e:85:e7:57:ea:d7:fc:b0:15:11:bf: ea:b9:0c:49:49:31:3c:3d:72:8c:dd:db:ea:ae:93:de: 5d:cb:74:0c:2d:c5:a9:b9:db:2a:33:de:a6:fa:0f:25 Fingerprint (MD5): A2:C7:A7:07:B6:61:81:8B:44:75:9B:50:C8:A7:4D:CA Fingerprint (SHA1): DF:4D:2D:4D:84:6E:22:58:71:02:58:0C:0F:9B:20:91:B6:36:8F:F0 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3053: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3054: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174747 (0x1371081b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:24 2012 Not After : Sun Mar 26 21:47:24 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:14:46:67:fa:a7:5d:2b:38:e6:a8:ef:55:d5:44:74: 6a:e8:a1:62:80:64:f0:f9:43:c0:2e:f3:df:f7:c6:8a: 28:84:f4:8e:49:3e:55:25:9e:ff:0c:b1:4d:87:75:46: 87:1d:71:2a:51:a4:9c:dd:9c:a5:a4:6d:cb:05:d2:73: 53:2c:f8:7c:db:b7:32:6d:89:8c:f9:fa:d4:86:92:e4: eb:c8:83:ba:7e:da:b8:b6:6b:d6:10:87:9f:24:13:90: 0b:e5:ee:ba:63:b1:c7:e0:6c:e3:8e:3f:c5:f4:4d:88: 23:0a:39:d5:c2:f7:9a:fb:93:8d:ef:5d:fe:c1:a3:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7d:d1:e1:65:0b:b4:95:8c:fc:5d:bf:54:89:0e:57:4a: d6:07:60:18:0a:c3:43:1b:59:12:26:ba:a8:2c:3d:e7: ba:e6:ae:b3:ce:a8:65:15:2d:1b:d1:d9:69:aa:69:6b: 16:9b:fd:0b:3e:ed:54:20:54:72:50:51:81:b0:a3:e8: 5c:b9:58:f7:63:fb:a7:33:2a:4b:fd:90:7b:a2:8f:f7: bf:61:ff:be:42:dd:d2:df:9e:3e:b4:0c:33:3d:61:c0: 92:13:43:67:92:37:ca:81:53:6f:4a:38:3b:c8:2e:c7: e5:4b:1a:e9:bd:72:12:a6:8a:cd:1d:3d:07:0b:16:d6 Fingerprint (MD5): ED:B0:EB:BA:7B:69:C3:23:C9:39:B5:96:F7:36:F3:76 Fingerprint (SHA1): B2:33:15:0D:6A:1F:BB:F1:54:4D:8A:9A:C7:27:E8:F3:05:9A:C1:7F Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3055: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3056: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174748 (0x1371081c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:47:25 2012 Not After : Sun Mar 26 21:47:25 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:40:7a:37:bb:a0:c2:85:cf:04:9c:66:72:64:c1:c0: 4a:81:6d:aa:2f:7e:00:0e:9f:c6:90:58:3b:a2:66:cc: d5:d3:e4:5b:dc:9e:71:c1:72:6e:99:04:03:c1:ce:35: 7f:31:db:ef:25:54:64:13:3e:9e:5c:18:fe:53:f8:62: c4:a2:db:2f:d8:1a:45:e4:46:85:74:af:b4:a0:8e:86: 90:5d:8e:44:66:f2:92:7b:1a:ca:8d:48:90:5a:f3:18: 27:ad:4f:30:c2:55:67:a1:35:37:ca:bd:70:8c:0c:0b: c7:42:a7:4a:dc:08:c1:06:29:ee:3a:8c:cd:1a:6c:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6f:d1:4e:df:d2:39:3a:5d:37:9c:67:37:f1:3c:67:8b: fc:18:94:11:c1:57:3d:55:8b:b9:25:37:2e:b0:3b:4b: b0:ad:f7:3c:97:e9:e8:87:89:2d:05:64:6c:60:b6:93: 55:70:26:aa:29:f1:f8:b2:47:79:3b:1d:f4:3d:a0:8d: 68:d6:5f:e4:5c:17:fd:9e:4d:2a:53:1f:68:e2:c1:c0: cd:da:eb:49:b6:ff:ce:60:95:74:47:59:ec:b5:1a:bd: fc:aa:5b:38:fb:41:ed:d9:5a:9a:52:6e:7d:e5:2e:e2: 93:a3:16:4a:b8:46:b0:b0:12:8c:25:4c:8d:27:5d:5e Fingerprint (MD5): AE:F7:60:46:16:92:83:5B:57:FD:BB:EF:96:C5:D5:D6 Fingerprint (SHA1): F1:F6:40:16:9E:4F:51:EC:B1:85:2F:7F:7C:B3:B7:8F:65:4A:C5:3B Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3057: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3058: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3059: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3060: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3061: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174746 (0x1371081a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:24 2012 Not After : Sun Mar 26 21:47:24 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:d2:4c:c8:89:72:67:0d:66:18:25:39:07:1b:11:5a: 8f:ad:56:d0:49:00:39:87:8f:3a:81:67:0f:5e:eb:06: e6:a8:1a:6b:5a:1b:19:a2:8f:5a:99:64:4b:13:bf:20: ca:cb:0f:10:05:e2:5e:49:a2:b8:2a:5a:a0:33:03:aa: 46:75:91:f8:5f:ea:4d:e8:6b:79:2e:35:ff:d1:cb:81: e2:9d:55:cc:6c:06:08:3b:1a:9c:ba:63:67:66:d9:ae: 49:ba:ea:74:9f:d4:20:a4:23:62:b1:dc:b5:6d:93:c8: 26:b5:a0:53:1d:f0:29:5b:15:dd:5e:6b:4a:3f:12:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:a9:b9:7c:c9:55:62:95:5c:13:16:02:bc:1d:18:da: 22:b4:1f:d3:a3:54:ac:47:e2:2f:69:51:b3:66:b5:2c: 6a:14:ff:02:a6:f7:a3:5c:43:a3:bb:cd:44:1a:35:ee: c5:a1:95:5d:95:e2:10:2f:7b:48:e4:db:09:e4:69:88: 85:b2:62:ca:36:6e:dd:6e:57:22:40:89:e0:f9:fe:a0: b6:cd:d6:c4:fb:4e:85:e7:57:ea:d7:fc:b0:15:11:bf: ea:b9:0c:49:49:31:3c:3d:72:8c:dd:db:ea:ae:93:de: 5d:cb:74:0c:2d:c5:a9:b9:db:2a:33:de:a6:fa:0f:25 Fingerprint (MD5): A2:C7:A7:07:B6:61:81:8B:44:75:9B:50:C8:A7:4D:CA Fingerprint (SHA1): DF:4D:2D:4D:84:6E:22:58:71:02:58:0C:0F:9B:20:91:B6:36:8F:F0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3062: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3063: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174747 (0x1371081b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:24 2012 Not After : Sun Mar 26 21:47:24 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:14:46:67:fa:a7:5d:2b:38:e6:a8:ef:55:d5:44:74: 6a:e8:a1:62:80:64:f0:f9:43:c0:2e:f3:df:f7:c6:8a: 28:84:f4:8e:49:3e:55:25:9e:ff:0c:b1:4d:87:75:46: 87:1d:71:2a:51:a4:9c:dd:9c:a5:a4:6d:cb:05:d2:73: 53:2c:f8:7c:db:b7:32:6d:89:8c:f9:fa:d4:86:92:e4: eb:c8:83:ba:7e:da:b8:b6:6b:d6:10:87:9f:24:13:90: 0b:e5:ee:ba:63:b1:c7:e0:6c:e3:8e:3f:c5:f4:4d:88: 23:0a:39:d5:c2:f7:9a:fb:93:8d:ef:5d:fe:c1:a3:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7d:d1:e1:65:0b:b4:95:8c:fc:5d:bf:54:89:0e:57:4a: d6:07:60:18:0a:c3:43:1b:59:12:26:ba:a8:2c:3d:e7: ba:e6:ae:b3:ce:a8:65:15:2d:1b:d1:d9:69:aa:69:6b: 16:9b:fd:0b:3e:ed:54:20:54:72:50:51:81:b0:a3:e8: 5c:b9:58:f7:63:fb:a7:33:2a:4b:fd:90:7b:a2:8f:f7: bf:61:ff:be:42:dd:d2:df:9e:3e:b4:0c:33:3d:61:c0: 92:13:43:67:92:37:ca:81:53:6f:4a:38:3b:c8:2e:c7: e5:4b:1a:e9:bd:72:12:a6:8a:cd:1d:3d:07:0b:16:d6 Fingerprint (MD5): ED:B0:EB:BA:7B:69:C3:23:C9:39:B5:96:F7:36:F3:76 Fingerprint (SHA1): B2:33:15:0D:6A:1F:BB:F1:54:4D:8A:9A:C7:27:E8:F3:05:9A:C1:7F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3064: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3065: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174748 (0x1371081c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:47:25 2012 Not After : Sun Mar 26 21:47:25 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:40:7a:37:bb:a0:c2:85:cf:04:9c:66:72:64:c1:c0: 4a:81:6d:aa:2f:7e:00:0e:9f:c6:90:58:3b:a2:66:cc: d5:d3:e4:5b:dc:9e:71:c1:72:6e:99:04:03:c1:ce:35: 7f:31:db:ef:25:54:64:13:3e:9e:5c:18:fe:53:f8:62: c4:a2:db:2f:d8:1a:45:e4:46:85:74:af:b4:a0:8e:86: 90:5d:8e:44:66:f2:92:7b:1a:ca:8d:48:90:5a:f3:18: 27:ad:4f:30:c2:55:67:a1:35:37:ca:bd:70:8c:0c:0b: c7:42:a7:4a:dc:08:c1:06:29:ee:3a:8c:cd:1a:6c:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6f:d1:4e:df:d2:39:3a:5d:37:9c:67:37:f1:3c:67:8b: fc:18:94:11:c1:57:3d:55:8b:b9:25:37:2e:b0:3b:4b: b0:ad:f7:3c:97:e9:e8:87:89:2d:05:64:6c:60:b6:93: 55:70:26:aa:29:f1:f8:b2:47:79:3b:1d:f4:3d:a0:8d: 68:d6:5f:e4:5c:17:fd:9e:4d:2a:53:1f:68:e2:c1:c0: cd:da:eb:49:b6:ff:ce:60:95:74:47:59:ec:b5:1a:bd: fc:aa:5b:38:fb:41:ed:d9:5a:9a:52:6e:7d:e5:2e:e2: 93:a3:16:4a:b8:46:b0:b0:12:8c:25:4c:8d:27:5d:5e Fingerprint (MD5): AE:F7:60:46:16:92:83:5B:57:FD:BB:EF:96:C5:D5:D6 Fingerprint (SHA1): F1:F6:40:16:9E:4F:51:EC:B1:85:2F:7F:7C:B3:B7:8F:65:4A:C5:3B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3066: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3067: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3068: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174750 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3069: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3070: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3071: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3072: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174751 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3073: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3074: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3075: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3076: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174752 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3077: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3078: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3079: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3080: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326174753 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3081: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #3082: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3083: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3084: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326174754 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3085: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #3086: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3087: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174750 (0x1371081e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:62:9d:64:27:3f:d2:56:8b:a5:4c:9a:50:51:63:37: 01:54:19:34:08:98:3c:df:c2:a6:e2:77:19:54:57:8f: d7:c5:c7:bd:9e:23:07:1a:93:a2:0c:1c:4f:38:a6:ab: e4:f7:9d:f1:70:4f:f5:cd:9c:4c:ed:27:b5:19:f5:ca: da:45:51:b9:b3:7b:0c:06:66:99:96:28:c3:a7:0a:cf: 1e:9d:d4:1c:b9:3c:04:4f:0f:45:85:65:e6:ce:e6:f6: 2f:37:9e:74:5e:d9:c0:77:47:88:40:32:a0:3b:42:75: 4d:bf:ea:e8:5f:c2:c3:66:35:81:b0:0e:2f:2c:6c:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ae:a4:23:aa:c7:2b:09:1b:1a:82:d9:61:61:b2:2f:3b: 82:9e:23:68:69:f1:48:d0:36:55:61:10:16:4b:f9:86: 99:92:de:ea:6a:94:25:31:0c:02:22:7d:4d:a9:32:1b: 3b:75:70:d2:66:df:61:84:71:6f:76:49:da:28:af:71: 8c:56:eb:8f:bd:46:84:85:59:ec:e8:a1:b6:27:a5:b5: 7f:d2:5d:77:16:87:70:4e:eb:6e:08:13:42:91:c5:6f: 89:d8:54:bf:83:a5:df:f7:91:a3:41:ca:1f:07:44:90: b1:9c:38:38:e5:31:fa:2a:22:3e:fc:d4:b5:d7:1a:fd Fingerprint (MD5): 0F:1B:A8:A1:3C:38:BC:09:A0:BB:D8:8A:F3:3A:2C:0A Fingerprint (SHA1): A8:64:44:74:B9:43:F1:5E:27:7B:78:63:25:5C:CC:85:EC:BE:6A:12 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3088: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3089: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174751 (0x1371081f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:7c:02:ba:81:b0:fe:4e:c8:1d:6f:13:be:50:16:58: a9:06:8a:7c:28:e2:0d:b3:8e:bd:5b:7d:2a:4b:ca:bf: a9:79:a5:11:7b:cf:5c:1a:9c:89:8d:a8:92:95:be:04: 60:b1:1e:45:8a:fc:9c:4f:8a:82:af:e8:41:82:00:74: 52:0f:9a:e3:72:4f:66:f9:c7:81:cb:2d:ab:1c:4f:44: ab:26:40:85:ef:ad:4b:b1:2d:02:14:ad:5a:22:b6:63: e2:ad:f3:50:1e:64:d2:8b:db:db:ce:82:2c:7d:97:e5: 0e:1e:2c:84:a5:f3:42:b5:54:4d:93:96:23:0d:79:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 52:f1:8c:f5:7a:d8:b9:d0:2e:b1:83:bb:5e:45:e6:f9: 7a:db:d6:ab:b0:6c:bc:36:fb:9a:da:88:cb:0e:56:0d: a1:bb:9a:81:b8:15:18:a5:02:5f:0b:a0:32:88:14:57: 31:1e:fe:26:0b:67:8f:29:eb:a1:b7:14:fe:81:1f:40: 20:75:49:d1:5d:3d:2f:8e:2a:2e:4c:73:ed:9e:53:be: ff:e5:3d:3c:b8:e6:fe:61:9c:12:02:ae:5b:02:d2:46: 85:96:f2:84:eb:9c:a0:7a:e3:a3:85:c2:c0:68:0f:02: b7:a4:28:dc:8d:d0:0e:0b:98:45:e7:e1:b7:2c:a6:1b Fingerprint (MD5): 9D:A0:43:2C:B3:45:0C:F8:C6:2A:EF:58:4E:BA:AF:E0 Fingerprint (SHA1): 32:D9:74:58:AC:ED:08:50:6F:F0:4B:E2:E8:52:AF:51:A8:74:0D:18 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3090: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3091: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174752 (0x13710820) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:19:8a:13:f7:22:3a:f6:12:06:25:69:e5:eb:58:27: e5:14:bc:d4:f4:2b:61:36:31:07:30:59:bf:4c:d8:03: 71:33:aa:36:f4:e7:ea:3e:54:89:50:fd:12:d9:3f:d7: 24:b1:20:b4:8e:e9:4c:e9:a0:79:ef:44:e3:95:4a:8c: 22:12:c9:97:a7:af:53:60:87:20:a2:a5:e0:d3:cc:c9: ad:03:8b:a5:6e:9a:4f:43:3c:19:52:b1:68:f4:39:5e: 02:52:83:d0:d2:73:63:53:f1:95:71:25:ff:ba:6a:6a: a0:35:56:09:6e:23:a8:84:58:f6:eb:5e:d1:8d:88:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 32:58:96:7b:6b:b3:7a:9e:68:ef:21:aa:18:32:0a:68: aa:48:92:aa:e3:13:23:1b:fa:82:bf:6f:ce:33:90:0c: 30:08:e2:00:da:f0:28:5b:12:29:f5:18:1f:c9:96:35: 0e:cd:0c:e1:f6:0f:9f:00:16:ec:df:4f:11:a0:07:cf: 68:22:2b:cb:5d:d0:d4:7c:2d:0f:34:52:5b:90:19:15: 45:6a:9e:8b:a8:4c:06:c0:82:89:d5:d7:09:2c:22:6c: 4d:e3:0a:a2:6b:a6:b6:23:0b:c5:05:1d:ed:ff:6e:3a: b1:a7:3e:a1:1a:8f:ca:e2:4c:76:cd:1f:4e:34:9b:51 Fingerprint (MD5): F9:E8:A7:7E:C0:D1:5E:84:2E:11:C8:C1:76:28:34:D7 Fingerprint (SHA1): AB:53:C0:E7:34:2B:EE:D2:EB:21:E1:29:34:7E:6C:2C:38:02:F5:51 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3092: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3093: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3094: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3095: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3096: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174750 (0x1371081e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:62:9d:64:27:3f:d2:56:8b:a5:4c:9a:50:51:63:37: 01:54:19:34:08:98:3c:df:c2:a6:e2:77:19:54:57:8f: d7:c5:c7:bd:9e:23:07:1a:93:a2:0c:1c:4f:38:a6:ab: e4:f7:9d:f1:70:4f:f5:cd:9c:4c:ed:27:b5:19:f5:ca: da:45:51:b9:b3:7b:0c:06:66:99:96:28:c3:a7:0a:cf: 1e:9d:d4:1c:b9:3c:04:4f:0f:45:85:65:e6:ce:e6:f6: 2f:37:9e:74:5e:d9:c0:77:47:88:40:32:a0:3b:42:75: 4d:bf:ea:e8:5f:c2:c3:66:35:81:b0:0e:2f:2c:6c:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ae:a4:23:aa:c7:2b:09:1b:1a:82:d9:61:61:b2:2f:3b: 82:9e:23:68:69:f1:48:d0:36:55:61:10:16:4b:f9:86: 99:92:de:ea:6a:94:25:31:0c:02:22:7d:4d:a9:32:1b: 3b:75:70:d2:66:df:61:84:71:6f:76:49:da:28:af:71: 8c:56:eb:8f:bd:46:84:85:59:ec:e8:a1:b6:27:a5:b5: 7f:d2:5d:77:16:87:70:4e:eb:6e:08:13:42:91:c5:6f: 89:d8:54:bf:83:a5:df:f7:91:a3:41:ca:1f:07:44:90: b1:9c:38:38:e5:31:fa:2a:22:3e:fc:d4:b5:d7:1a:fd Fingerprint (MD5): 0F:1B:A8:A1:3C:38:BC:09:A0:BB:D8:8A:F3:3A:2C:0A Fingerprint (SHA1): A8:64:44:74:B9:43:F1:5E:27:7B:78:63:25:5C:CC:85:EC:BE:6A:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3097: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3098: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174751 (0x1371081f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:7c:02:ba:81:b0:fe:4e:c8:1d:6f:13:be:50:16:58: a9:06:8a:7c:28:e2:0d:b3:8e:bd:5b:7d:2a:4b:ca:bf: a9:79:a5:11:7b:cf:5c:1a:9c:89:8d:a8:92:95:be:04: 60:b1:1e:45:8a:fc:9c:4f:8a:82:af:e8:41:82:00:74: 52:0f:9a:e3:72:4f:66:f9:c7:81:cb:2d:ab:1c:4f:44: ab:26:40:85:ef:ad:4b:b1:2d:02:14:ad:5a:22:b6:63: e2:ad:f3:50:1e:64:d2:8b:db:db:ce:82:2c:7d:97:e5: 0e:1e:2c:84:a5:f3:42:b5:54:4d:93:96:23:0d:79:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 52:f1:8c:f5:7a:d8:b9:d0:2e:b1:83:bb:5e:45:e6:f9: 7a:db:d6:ab:b0:6c:bc:36:fb:9a:da:88:cb:0e:56:0d: a1:bb:9a:81:b8:15:18:a5:02:5f:0b:a0:32:88:14:57: 31:1e:fe:26:0b:67:8f:29:eb:a1:b7:14:fe:81:1f:40: 20:75:49:d1:5d:3d:2f:8e:2a:2e:4c:73:ed:9e:53:be: ff:e5:3d:3c:b8:e6:fe:61:9c:12:02:ae:5b:02:d2:46: 85:96:f2:84:eb:9c:a0:7a:e3:a3:85:c2:c0:68:0f:02: b7:a4:28:dc:8d:d0:0e:0b:98:45:e7:e1:b7:2c:a6:1b Fingerprint (MD5): 9D:A0:43:2C:B3:45:0C:F8:C6:2A:EF:58:4E:BA:AF:E0 Fingerprint (SHA1): 32:D9:74:58:AC:ED:08:50:6F:F0:4B:E2:E8:52:AF:51:A8:74:0D:18 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3099: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3100: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174752 (0x13710820) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:19:8a:13:f7:22:3a:f6:12:06:25:69:e5:eb:58:27: e5:14:bc:d4:f4:2b:61:36:31:07:30:59:bf:4c:d8:03: 71:33:aa:36:f4:e7:ea:3e:54:89:50:fd:12:d9:3f:d7: 24:b1:20:b4:8e:e9:4c:e9:a0:79:ef:44:e3:95:4a:8c: 22:12:c9:97:a7:af:53:60:87:20:a2:a5:e0:d3:cc:c9: ad:03:8b:a5:6e:9a:4f:43:3c:19:52:b1:68:f4:39:5e: 02:52:83:d0:d2:73:63:53:f1:95:71:25:ff:ba:6a:6a: a0:35:56:09:6e:23:a8:84:58:f6:eb:5e:d1:8d:88:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 32:58:96:7b:6b:b3:7a:9e:68:ef:21:aa:18:32:0a:68: aa:48:92:aa:e3:13:23:1b:fa:82:bf:6f:ce:33:90:0c: 30:08:e2:00:da:f0:28:5b:12:29:f5:18:1f:c9:96:35: 0e:cd:0c:e1:f6:0f:9f:00:16:ec:df:4f:11:a0:07:cf: 68:22:2b:cb:5d:d0:d4:7c:2d:0f:34:52:5b:90:19:15: 45:6a:9e:8b:a8:4c:06:c0:82:89:d5:d7:09:2c:22:6c: 4d:e3:0a:a2:6b:a6:b6:23:0b:c5:05:1d:ed:ff:6e:3a: b1:a7:3e:a1:1a:8f:ca:e2:4c:76:cd:1f:4e:34:9b:51 Fingerprint (MD5): F9:E8:A7:7E:C0:D1:5E:84:2E:11:C8:C1:76:28:34:D7 Fingerprint (SHA1): AB:53:C0:E7:34:2B:EE:D2:EB:21:E1:29:34:7E:6C:2C:38:02:F5:51 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3101: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3102: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174750 (0x1371081e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:62:9d:64:27:3f:d2:56:8b:a5:4c:9a:50:51:63:37: 01:54:19:34:08:98:3c:df:c2:a6:e2:77:19:54:57:8f: d7:c5:c7:bd:9e:23:07:1a:93:a2:0c:1c:4f:38:a6:ab: e4:f7:9d:f1:70:4f:f5:cd:9c:4c:ed:27:b5:19:f5:ca: da:45:51:b9:b3:7b:0c:06:66:99:96:28:c3:a7:0a:cf: 1e:9d:d4:1c:b9:3c:04:4f:0f:45:85:65:e6:ce:e6:f6: 2f:37:9e:74:5e:d9:c0:77:47:88:40:32:a0:3b:42:75: 4d:bf:ea:e8:5f:c2:c3:66:35:81:b0:0e:2f:2c:6c:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ae:a4:23:aa:c7:2b:09:1b:1a:82:d9:61:61:b2:2f:3b: 82:9e:23:68:69:f1:48:d0:36:55:61:10:16:4b:f9:86: 99:92:de:ea:6a:94:25:31:0c:02:22:7d:4d:a9:32:1b: 3b:75:70:d2:66:df:61:84:71:6f:76:49:da:28:af:71: 8c:56:eb:8f:bd:46:84:85:59:ec:e8:a1:b6:27:a5:b5: 7f:d2:5d:77:16:87:70:4e:eb:6e:08:13:42:91:c5:6f: 89:d8:54:bf:83:a5:df:f7:91:a3:41:ca:1f:07:44:90: b1:9c:38:38:e5:31:fa:2a:22:3e:fc:d4:b5:d7:1a:fd Fingerprint (MD5): 0F:1B:A8:A1:3C:38:BC:09:A0:BB:D8:8A:F3:3A:2C:0A Fingerprint (SHA1): A8:64:44:74:B9:43:F1:5E:27:7B:78:63:25:5C:CC:85:EC:BE:6A:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3103: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174750 (0x1371081e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:62:9d:64:27:3f:d2:56:8b:a5:4c:9a:50:51:63:37: 01:54:19:34:08:98:3c:df:c2:a6:e2:77:19:54:57:8f: d7:c5:c7:bd:9e:23:07:1a:93:a2:0c:1c:4f:38:a6:ab: e4:f7:9d:f1:70:4f:f5:cd:9c:4c:ed:27:b5:19:f5:ca: da:45:51:b9:b3:7b:0c:06:66:99:96:28:c3:a7:0a:cf: 1e:9d:d4:1c:b9:3c:04:4f:0f:45:85:65:e6:ce:e6:f6: 2f:37:9e:74:5e:d9:c0:77:47:88:40:32:a0:3b:42:75: 4d:bf:ea:e8:5f:c2:c3:66:35:81:b0:0e:2f:2c:6c:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ae:a4:23:aa:c7:2b:09:1b:1a:82:d9:61:61:b2:2f:3b: 82:9e:23:68:69:f1:48:d0:36:55:61:10:16:4b:f9:86: 99:92:de:ea:6a:94:25:31:0c:02:22:7d:4d:a9:32:1b: 3b:75:70:d2:66:df:61:84:71:6f:76:49:da:28:af:71: 8c:56:eb:8f:bd:46:84:85:59:ec:e8:a1:b6:27:a5:b5: 7f:d2:5d:77:16:87:70:4e:eb:6e:08:13:42:91:c5:6f: 89:d8:54:bf:83:a5:df:f7:91:a3:41:ca:1f:07:44:90: b1:9c:38:38:e5:31:fa:2a:22:3e:fc:d4:b5:d7:1a:fd Fingerprint (MD5): 0F:1B:A8:A1:3C:38:BC:09:A0:BB:D8:8A:F3:3A:2C:0A Fingerprint (SHA1): A8:64:44:74:B9:43:F1:5E:27:7B:78:63:25:5C:CC:85:EC:BE:6A:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3104: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174751 (0x1371081f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:7c:02:ba:81:b0:fe:4e:c8:1d:6f:13:be:50:16:58: a9:06:8a:7c:28:e2:0d:b3:8e:bd:5b:7d:2a:4b:ca:bf: a9:79:a5:11:7b:cf:5c:1a:9c:89:8d:a8:92:95:be:04: 60:b1:1e:45:8a:fc:9c:4f:8a:82:af:e8:41:82:00:74: 52:0f:9a:e3:72:4f:66:f9:c7:81:cb:2d:ab:1c:4f:44: ab:26:40:85:ef:ad:4b:b1:2d:02:14:ad:5a:22:b6:63: e2:ad:f3:50:1e:64:d2:8b:db:db:ce:82:2c:7d:97:e5: 0e:1e:2c:84:a5:f3:42:b5:54:4d:93:96:23:0d:79:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 52:f1:8c:f5:7a:d8:b9:d0:2e:b1:83:bb:5e:45:e6:f9: 7a:db:d6:ab:b0:6c:bc:36:fb:9a:da:88:cb:0e:56:0d: a1:bb:9a:81:b8:15:18:a5:02:5f:0b:a0:32:88:14:57: 31:1e:fe:26:0b:67:8f:29:eb:a1:b7:14:fe:81:1f:40: 20:75:49:d1:5d:3d:2f:8e:2a:2e:4c:73:ed:9e:53:be: ff:e5:3d:3c:b8:e6:fe:61:9c:12:02:ae:5b:02:d2:46: 85:96:f2:84:eb:9c:a0:7a:e3:a3:85:c2:c0:68:0f:02: b7:a4:28:dc:8d:d0:0e:0b:98:45:e7:e1:b7:2c:a6:1b Fingerprint (MD5): 9D:A0:43:2C:B3:45:0C:F8:C6:2A:EF:58:4E:BA:AF:E0 Fingerprint (SHA1): 32:D9:74:58:AC:ED:08:50:6F:F0:4B:E2:E8:52:AF:51:A8:74:0D:18 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3105: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174751 (0x1371081f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:7c:02:ba:81:b0:fe:4e:c8:1d:6f:13:be:50:16:58: a9:06:8a:7c:28:e2:0d:b3:8e:bd:5b:7d:2a:4b:ca:bf: a9:79:a5:11:7b:cf:5c:1a:9c:89:8d:a8:92:95:be:04: 60:b1:1e:45:8a:fc:9c:4f:8a:82:af:e8:41:82:00:74: 52:0f:9a:e3:72:4f:66:f9:c7:81:cb:2d:ab:1c:4f:44: ab:26:40:85:ef:ad:4b:b1:2d:02:14:ad:5a:22:b6:63: e2:ad:f3:50:1e:64:d2:8b:db:db:ce:82:2c:7d:97:e5: 0e:1e:2c:84:a5:f3:42:b5:54:4d:93:96:23:0d:79:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 52:f1:8c:f5:7a:d8:b9:d0:2e:b1:83:bb:5e:45:e6:f9: 7a:db:d6:ab:b0:6c:bc:36:fb:9a:da:88:cb:0e:56:0d: a1:bb:9a:81:b8:15:18:a5:02:5f:0b:a0:32:88:14:57: 31:1e:fe:26:0b:67:8f:29:eb:a1:b7:14:fe:81:1f:40: 20:75:49:d1:5d:3d:2f:8e:2a:2e:4c:73:ed:9e:53:be: ff:e5:3d:3c:b8:e6:fe:61:9c:12:02:ae:5b:02:d2:46: 85:96:f2:84:eb:9c:a0:7a:e3:a3:85:c2:c0:68:0f:02: b7:a4:28:dc:8d:d0:0e:0b:98:45:e7:e1:b7:2c:a6:1b Fingerprint (MD5): 9D:A0:43:2C:B3:45:0C:F8:C6:2A:EF:58:4E:BA:AF:E0 Fingerprint (SHA1): 32:D9:74:58:AC:ED:08:50:6F:F0:4B:E2:E8:52:AF:51:A8:74:0D:18 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3106: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174752 (0x13710820) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:19:8a:13:f7:22:3a:f6:12:06:25:69:e5:eb:58:27: e5:14:bc:d4:f4:2b:61:36:31:07:30:59:bf:4c:d8:03: 71:33:aa:36:f4:e7:ea:3e:54:89:50:fd:12:d9:3f:d7: 24:b1:20:b4:8e:e9:4c:e9:a0:79:ef:44:e3:95:4a:8c: 22:12:c9:97:a7:af:53:60:87:20:a2:a5:e0:d3:cc:c9: ad:03:8b:a5:6e:9a:4f:43:3c:19:52:b1:68:f4:39:5e: 02:52:83:d0:d2:73:63:53:f1:95:71:25:ff:ba:6a:6a: a0:35:56:09:6e:23:a8:84:58:f6:eb:5e:d1:8d:88:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 32:58:96:7b:6b:b3:7a:9e:68:ef:21:aa:18:32:0a:68: aa:48:92:aa:e3:13:23:1b:fa:82:bf:6f:ce:33:90:0c: 30:08:e2:00:da:f0:28:5b:12:29:f5:18:1f:c9:96:35: 0e:cd:0c:e1:f6:0f:9f:00:16:ec:df:4f:11:a0:07:cf: 68:22:2b:cb:5d:d0:d4:7c:2d:0f:34:52:5b:90:19:15: 45:6a:9e:8b:a8:4c:06:c0:82:89:d5:d7:09:2c:22:6c: 4d:e3:0a:a2:6b:a6:b6:23:0b:c5:05:1d:ed:ff:6e:3a: b1:a7:3e:a1:1a:8f:ca:e2:4c:76:cd:1f:4e:34:9b:51 Fingerprint (MD5): F9:E8:A7:7E:C0:D1:5E:84:2E:11:C8:C1:76:28:34:D7 Fingerprint (SHA1): AB:53:C0:E7:34:2B:EE:D2:EB:21:E1:29:34:7E:6C:2C:38:02:F5:51 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3107: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174752 (0x13710820) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:47:26 2012 Not After : Sun Mar 26 21:47:26 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:19:8a:13:f7:22:3a:f6:12:06:25:69:e5:eb:58:27: e5:14:bc:d4:f4:2b:61:36:31:07:30:59:bf:4c:d8:03: 71:33:aa:36:f4:e7:ea:3e:54:89:50:fd:12:d9:3f:d7: 24:b1:20:b4:8e:e9:4c:e9:a0:79:ef:44:e3:95:4a:8c: 22:12:c9:97:a7:af:53:60:87:20:a2:a5:e0:d3:cc:c9: ad:03:8b:a5:6e:9a:4f:43:3c:19:52:b1:68:f4:39:5e: 02:52:83:d0:d2:73:63:53:f1:95:71:25:ff:ba:6a:6a: a0:35:56:09:6e:23:a8:84:58:f6:eb:5e:d1:8d:88:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 32:58:96:7b:6b:b3:7a:9e:68:ef:21:aa:18:32:0a:68: aa:48:92:aa:e3:13:23:1b:fa:82:bf:6f:ce:33:90:0c: 30:08:e2:00:da:f0:28:5b:12:29:f5:18:1f:c9:96:35: 0e:cd:0c:e1:f6:0f:9f:00:16:ec:df:4f:11:a0:07:cf: 68:22:2b:cb:5d:d0:d4:7c:2d:0f:34:52:5b:90:19:15: 45:6a:9e:8b:a8:4c:06:c0:82:89:d5:d7:09:2c:22:6c: 4d:e3:0a:a2:6b:a6:b6:23:0b:c5:05:1d:ed:ff:6e:3a: b1:a7:3e:a1:1a:8f:ca:e2:4c:76:cd:1f:4e:34:9b:51 Fingerprint (MD5): F9:E8:A7:7E:C0:D1:5E:84:2E:11:C8:C1:76:28:34:D7 Fingerprint (SHA1): AB:53:C0:E7:34:2B:EE:D2:EB:21:E1:29:34:7E:6C:2C:38:02:F5:51 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3108: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3109: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174755 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3110: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3111: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3112: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3113: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326174756 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3114: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #3115: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3116: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3117: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174757 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3118: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3119: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3120: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3121: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 326174758 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3122: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der chains.sh: #3123: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3124: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3125: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326174759 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3126: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #3127: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3128: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3129: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326174760 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3130: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #3131: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #3132: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3133: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 326174761 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3134: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der chains.sh: #3135: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3136: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #3137: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #3138: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3139: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #3140: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174755 (0x13710823) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:28 2012 Not After : Sun Mar 26 21:47:28 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:32:db:ef:56:9a:2f:0e:07:f4:8d:91:d3:f9:cf:ec: 7a:9d:6a:72:25:a3:1f:0b:84:21:3e:c4:be:41:f3:04: 3a:8d:76:78:e3:db:21:cc:dd:3e:cc:2e:a4:00:9c:7b: 6d:18:a1:3f:bb:b1:c2:f3:2f:3f:cf:23:d0:04:7e:cf: e5:44:83:f7:00:3c:24:aa:cd:21:48:db:06:cf:d0:99: f4:cb:ee:4e:a4:6e:10:74:71:f7:05:06:01:ad:81:a5: 18:35:83:03:78:34:0a:96:fa:68:71:3a:69:8e:7e:ef: 8e:5d:19:63:f4:7d:8d:86:82:11:a8:c8:df:de:86:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:e5:3e:df:b2:7e:48:5b:6d:64:07:f1:ee:69:a9:68: 0d:19:b9:fb:71:0d:77:c9:28:47:66:01:89:08:a0:43: 61:75:67:df:5b:12:c5:c5:3c:72:e4:b0:3c:c0:ec:05: c3:04:a4:c2:c0:f3:27:01:bb:f5:47:28:66:cc:cb:ce: 54:c1:73:20:8f:57:4c:dd:12:18:e4:c2:3e:a9:ac:95: 6a:c5:46:04:f3:3e:5d:2a:ef:59:02:85:bd:5a:e1:c5: d1:7d:5a:09:26:a3:fb:f2:47:18:cd:cc:0b:60:1b:2c: b9:e9:58:3f:48:a4:b0:6e:0d:89:a7:4c:0a:a6:c7:84 Fingerprint (MD5): EF:6F:F8:83:4C:15:0B:8A:B0:00:05:21:7D:5B:E4:DB Fingerprint (SHA1): 34:06:72:C8:BE:02:76:86:A1:2B:27:86:9A:1A:DF:90:1D:6E:2E:20 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3141: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3142: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3143: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3144: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174755 (0x13710823) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:28 2012 Not After : Sun Mar 26 21:47:28 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:32:db:ef:56:9a:2f:0e:07:f4:8d:91:d3:f9:cf:ec: 7a:9d:6a:72:25:a3:1f:0b:84:21:3e:c4:be:41:f3:04: 3a:8d:76:78:e3:db:21:cc:dd:3e:cc:2e:a4:00:9c:7b: 6d:18:a1:3f:bb:b1:c2:f3:2f:3f:cf:23:d0:04:7e:cf: e5:44:83:f7:00:3c:24:aa:cd:21:48:db:06:cf:d0:99: f4:cb:ee:4e:a4:6e:10:74:71:f7:05:06:01:ad:81:a5: 18:35:83:03:78:34:0a:96:fa:68:71:3a:69:8e:7e:ef: 8e:5d:19:63:f4:7d:8d:86:82:11:a8:c8:df:de:86:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:e5:3e:df:b2:7e:48:5b:6d:64:07:f1:ee:69:a9:68: 0d:19:b9:fb:71:0d:77:c9:28:47:66:01:89:08:a0:43: 61:75:67:df:5b:12:c5:c5:3c:72:e4:b0:3c:c0:ec:05: c3:04:a4:c2:c0:f3:27:01:bb:f5:47:28:66:cc:cb:ce: 54:c1:73:20:8f:57:4c:dd:12:18:e4:c2:3e:a9:ac:95: 6a:c5:46:04:f3:3e:5d:2a:ef:59:02:85:bd:5a:e1:c5: d1:7d:5a:09:26:a3:fb:f2:47:18:cd:cc:0b:60:1b:2c: b9:e9:58:3f:48:a4:b0:6e:0d:89:a7:4c:0a:a6:c7:84 Fingerprint (MD5): EF:6F:F8:83:4C:15:0B:8A:B0:00:05:21:7D:5B:E4:DB Fingerprint (SHA1): 34:06:72:C8:BE:02:76:86:A1:2B:27:86:9A:1A:DF:90:1D:6E:2E:20 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3145: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3146: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3147: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174762 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3148: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3149: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3150: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3151: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326174763 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3152: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #3153: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #3154: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3155: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 326174764 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3156: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der chains.sh: #3157: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #3158: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3159: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 326174765 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3160: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der chains.sh: #3161: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3162: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3163: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 326174766 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3164: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der chains.sh: #3165: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #3166: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3167: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 326174767 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3168: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der chains.sh: #3169: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #3170: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3171: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 326174768 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3172: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der chains.sh: #3173: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3174: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3175: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 326174769 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3176: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der chains.sh: #3177: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #3178: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3179: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 326174770 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3180: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der chains.sh: #3181: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #3182: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3183: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 326174771 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3184: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der chains.sh: #3185: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3186: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3187: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 326174772 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3188: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der chains.sh: #3189: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #3190: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3191: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 326174773 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3192: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der chains.sh: #3193: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #3194: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3195: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 326174774 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3196: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der chains.sh: #3197: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3198: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3199: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 326174775 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3200: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der chains.sh: #3201: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #3202: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3203: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 326174776 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3204: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der chains.sh: #3205: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #3206: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3207: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 326174777 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3208: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der chains.sh: #3209: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #3210: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3211: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 326174778 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3212: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der chains.sh: #3213: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #3214: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3215: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 326174779 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3216: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der chains.sh: #3217: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #3218: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3219: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 326174780 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3220: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der chains.sh: #3221: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #3222: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3223: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 326174781 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3224: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der chains.sh: #3225: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #3226: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3227: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 326174782 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3228: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der chains.sh: #3229: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #3230: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3231: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 326174783 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3232: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der chains.sh: #3233: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #3234: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3235: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 326174784 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3236: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der chains.sh: #3237: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #3238: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3239: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 326174785 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3240: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der chains.sh: #3241: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #3242: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3243: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 326174786 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3244: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der chains.sh: #3245: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #3246: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3247: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 326174787 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3248: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der chains.sh: #3249: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #3250: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3251: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 326174788 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3252: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der chains.sh: #3253: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3254: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3255: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 326174789 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3256: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der chains.sh: #3257: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3258: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3259: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 326174790 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3260: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der chains.sh: #3261: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3262: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3263: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 326174791 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3264: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der chains.sh: #3265: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3266: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3267: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3268: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3269: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3270: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3271: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3272: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3273: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3274: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3275: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3276: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3277: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3278: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3279: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3280: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3281: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3282: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3283: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3284: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3285: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3286: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3287: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3288: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174762 (0x1371082a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:47:30 2012 Not After : Sun Mar 26 21:47:30 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:01:35:81:bf:95:bd:b7:23:4f:38:d0:7d:a4:79:08: 54:c7:be:f3:70:75:d2:59:79:d3:3a:1b:2a:5a:7e:9d: 10:65:4f:b6:20:25:24:0f:23:cd:ab:ce:51:c4:00:cc: 93:cc:6c:a4:6b:67:4d:a6:7b:b7:00:87:4a:d5:cf:49: 10:2d:59:07:f6:c9:b5:ce:13:e6:0a:f6:38:de:d7:e5: 85:57:56:d2:20:48:2e:ac:83:8c:0c:03:0d:69:a8:ca: cf:0e:7b:0a:b1:45:cd:1f:34:bc:2e:52:dd:db:74:46: b0:57:cc:12:e0:c6:98:7e:c8:10:32:bd:24:65:d5:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bb:34:8e:44:09:06:52:13:9a:01:b7:86:f2:4f:4f:09: c0:9b:38:2e:ae:2f:0f:57:32:38:61:23:ad:14:67:d9: f2:05:95:e0:d2:26:1b:5e:ec:ab:5e:9f:6a:d2:c2:26: a0:b2:af:ed:b0:c0:67:1d:e5:e4:8f:76:66:05:e0:46: c2:de:b1:a6:5d:1c:a5:89:ec:6d:7d:76:3f:a1:bc:e0: d7:b1:79:e0:16:6f:86:5e:5b:b1:7e:53:07:08:cf:41: 89:cf:6f:27:27:f6:08:63:2b:e6:b9:36:4c:98:2b:67: 3b:a5:9c:49:35:32:be:92:85:e2:b6:ff:d0:a4:ab:eb Fingerprint (MD5): 8A:6A:E2:C7:69:B7:13:A5:5C:9F:88:F2:63:35:23:94 Fingerprint (SHA1): AC:E8:D0:FE:52:6A:71:98:9B:6C:15:E6:13:2B:50:2C:27:FB:5D:70 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3289: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3290: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3291: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174792 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3292: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3293: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3294: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3295: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 326174793 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3296: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der chains.sh: #3297: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3298: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3299: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 326174794 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3300: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der chains.sh: #3301: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3302: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3303: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 326174795 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3304: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der chains.sh: #3305: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3306: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3307: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 326174796 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3308: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der chains.sh: #3309: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3310: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3311: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 326174797 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3312: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der chains.sh: #3313: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3314: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3315: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 326174798 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3316: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der chains.sh: #3317: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3318: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174792 (0x13710848) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:39 2012 Not After : Sun Mar 26 21:47:39 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:2c:cc:a7:8e:49:66:de:e0:45:e1:db:7a:0a:0b:12: a3:46:02:43:28:01:66:ce:9d:ae:5e:d0:bf:ef:65:e1: 71:26:f6:57:f2:04:83:bc:f6:00:d6:98:52:6e:3b:4f: 9e:c2:46:ad:0f:58:19:c5:38:af:fa:8f:6f:7c:32:e2: f5:47:dd:9f:69:3a:97:01:b9:3c:c6:b5:e4:0f:bf:cb: 44:4f:cf:28:80:9d:8b:75:b5:3b:0a:a4:61:3c:ed:4b: bb:f1:58:f0:cd:2c:e9:38:96:b9:ab:90:a5:9b:85:d3: 88:de:18:98:8a:94:93:b2:d8:f2:6f:7f:98:3f:f4:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0d:e4:12:c7:83:93:61:68:67:3f:08:02:ef:a8:63:bd: 75:e5:a5:a1:b0:1b:0a:6a:5c:bd:d0:46:99:7a:7d:7b: 1a:de:ed:c8:e1:79:4b:5a:18:a1:49:3a:1c:08:a4:c7: f6:9c:91:74:cc:d2:1d:09:6e:e6:9c:33:a8:45:ea:50: 51:5e:24:24:f8:90:a0:75:9e:af:47:c1:c2:17:ff:22: 98:5c:ee:0f:82:1f:75:39:aa:ed:61:a2:e4:66:bd:d3: f4:be:2e:88:29:ab:56:db:c9:e6:f5:0c:d6:af:b0:ca: 14:17:64:60:ab:01:03:11:10:8d:9a:37:fc:8f:cf:05 Fingerprint (MD5): E3:5A:46:98:B4:92:B5:52:15:85:77:0C:DF:33:FD:B1 Fingerprint (SHA1): BC:0E:F4:D9:83:AB:8A:65:EC:7E:89:1B:F2:D2:83:AB:B0:DA:F8:9B Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3319: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3320: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3321: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3322: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174792 (0x13710848) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:39 2012 Not After : Sun Mar 26 21:47:39 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:2c:cc:a7:8e:49:66:de:e0:45:e1:db:7a:0a:0b:12: a3:46:02:43:28:01:66:ce:9d:ae:5e:d0:bf:ef:65:e1: 71:26:f6:57:f2:04:83:bc:f6:00:d6:98:52:6e:3b:4f: 9e:c2:46:ad:0f:58:19:c5:38:af:fa:8f:6f:7c:32:e2: f5:47:dd:9f:69:3a:97:01:b9:3c:c6:b5:e4:0f:bf:cb: 44:4f:cf:28:80:9d:8b:75:b5:3b:0a:a4:61:3c:ed:4b: bb:f1:58:f0:cd:2c:e9:38:96:b9:ab:90:a5:9b:85:d3: 88:de:18:98:8a:94:93:b2:d8:f2:6f:7f:98:3f:f4:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0d:e4:12:c7:83:93:61:68:67:3f:08:02:ef:a8:63:bd: 75:e5:a5:a1:b0:1b:0a:6a:5c:bd:d0:46:99:7a:7d:7b: 1a:de:ed:c8:e1:79:4b:5a:18:a1:49:3a:1c:08:a4:c7: f6:9c:91:74:cc:d2:1d:09:6e:e6:9c:33:a8:45:ea:50: 51:5e:24:24:f8:90:a0:75:9e:af:47:c1:c2:17:ff:22: 98:5c:ee:0f:82:1f:75:39:aa:ed:61:a2:e4:66:bd:d3: f4:be:2e:88:29:ab:56:db:c9:e6:f5:0c:d6:af:b0:ca: 14:17:64:60:ab:01:03:11:10:8d:9a:37:fc:8f:cf:05 Fingerprint (MD5): E3:5A:46:98:B4:92:B5:52:15:85:77:0C:DF:33:FD:B1 Fingerprint (SHA1): BC:0E:F4:D9:83:AB:8A:65:EC:7E:89:1B:F2:D2:83:AB:B0:DA:F8:9B Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3323: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3324: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3325: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3326: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174799 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3327: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3328: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3329: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3330: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174800 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3331: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3332: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3333: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3334: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174801 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3335: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3336: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3337: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3338: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174802 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3339: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #3340: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3341: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3342: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3343: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3344: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174799 (0x1371084f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:41 2012 Not After : Sun Mar 26 21:47:41 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:dc:48:94:b3:6b:78:bb:3e:f8:64:8c:c0:14:cb:a1: 3a:9c:7e:f2:b9:e0:6d:1b:08:fd:3f:43:0b:cd:d7:37: 4c:38:b2:07:a7:80:9d:b3:5b:41:e8:db:da:47:dd:6a: 4b:b4:c0:ee:16:86:8d:bf:ef:97:ea:95:9e:40:61:0e: 62:01:5b:4d:1b:18:89:89:f3:5e:44:35:2e:c5:44:08: 52:00:18:11:35:d3:99:d0:c8:69:93:65:46:69:6d:e8: 2a:fb:e7:6b:f2:6f:b8:95:5e:b2:72:ad:a9:0c:93:2c: fb:74:a7:38:77:2d:79:7c:e5:23:e8:c3:7e:f1:16:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a5:8d:02:b9:a0:15:8b:1d:77:80:d8:e7:98:59:08:0e: e5:65:f0:82:5e:f6:2d:06:8f:e7:69:43:7b:3e:43:67: f2:a9:ad:2b:01:51:8b:53:5c:8a:8d:24:1a:c4:ba:c5: 21:aa:95:57:31:77:78:2f:8f:35:15:ed:48:c8:1c:f6: 48:ee:ef:8c:33:55:9d:4f:80:d1:0c:ad:98:f0:1d:72: b9:1b:41:9a:71:b1:e0:70:55:87:50:18:9f:c7:d8:8b: e8:c7:85:18:d9:39:c6:40:e8:27:cd:90:f5:69:bc:d9: 0f:82:5e:e1:aa:5f:9a:c3:aa:9f:34:20:a1:16:18:ba Fingerprint (MD5): 32:84:00:45:72:EF:37:2B:95:A6:33:3E:4A:CE:0E:34 Fingerprint (SHA1): A4:98:95:6F:0B:48:6C:0E:B6:67:9B:DF:2C:1C:B2:6A:A0:30:21:33 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3345: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3346: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3347: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174800 (0x13710850) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:42 2012 Not After : Sun Mar 26 21:47:42 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:f9:98:86:25:81:e2:67:20:73:43:94:bf:1c:93:91: 65:e4:1f:6d:82:e0:43:c3:42:ed:6a:d4:c4:1a:5e:06: 68:f1:14:fb:02:b0:a2:f3:0f:3f:0b:e4:c9:d6:62:40: e0:4d:0e:d9:69:d7:ab:61:9d:40:ce:45:e1:7b:3a:8d: a2:96:fd:dc:23:fa:28:cf:16:f3:33:17:3c:b2:44:ce: 5f:04:a4:1c:de:a4:cd:ec:3b:07:b8:0b:6e:07:2f:e4: e8:3a:07:b6:56:24:9e:b9:66:e6:b6:da:45:d4:14:dc: a6:66:9a:6e:4c:7a:b2:ca:0d:b4:5e:43:ea:a0:e0:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:17:3c:bd:5a:c6:4e:8a:ed:c0:c4:d3:6b:b1:be:82: fb:74:b6:30:5d:c6:1c:b7:a8:30:0e:47:ec:8c:b4:41: f2:b8:e2:88:2e:f8:16:8b:ae:f3:6f:b2:cc:a2:1e:ce: 45:98:23:1c:c0:51:73:53:f8:f9:d7:8d:2f:97:22:5c: c9:40:01:f5:d5:eb:6a:dd:77:66:27:fb:8a:75:0f:f6: 55:72:3c:88:15:95:7e:fc:6e:1c:e9:12:d6:3d:80:60: fd:ea:64:38:01:f9:54:ad:0b:a1:4d:22:3e:ae:11:68: 88:51:86:6a:36:77:c4:0f:15:f9:88:80:ac:19:c4:0a Fingerprint (MD5): 3C:CB:C0:25:FC:42:00:B1:29:E5:32:5C:E5:71:E1:3A Fingerprint (SHA1): 69:D6:9E:01:E1:0D:60:44:2F:FE:44:07:98:BA:F5:0A:7C:C9:BC:13 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3348: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3349: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174801 (0x13710851) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:47:42 2012 Not After : Sun Mar 26 21:47:42 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:e3:a6:3f:22:58:50:b7:02:fe:0c:9d:69:b3:b4:30: d2:a7:ff:11:7f:57:5c:13:2d:2e:f0:1b:a1:d4:39:42: 83:fd:59:33:ff:2b:e3:38:e0:74:4b:4c:d8:83:8b:3f: 0c:f2:28:e9:81:86:30:81:4d:77:23:5b:66:2b:ad:47: 6f:7e:de:a6:6e:c6:3b:87:78:70:d8:63:dd:88:52:bc: 22:1d:e3:34:89:29:9d:d0:b3:96:fd:3d:03:68:f0:0b: e1:8b:a3:66:d8:b1:f9:d3:f7:d3:43:99:0c:c0:06:83: 5d:91:f8:74:f8:03:37:9a:e0:6a:a1:d2:4e:d7:12:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:60:a3:1d:07:63:b5:2d:6f:b9:06:19:bd:2b:61:b6: 80:12:83:d3:11:81:35:4b:ca:bb:fa:52:f5:c8:ac:72: dd:ef:ce:0f:4c:df:b7:d2:f5:3f:7e:0d:2d:45:f0:23: 89:45:39:74:6b:36:bb:b5:6e:12:95:e1:5e:b6:b4:c8: ba:4d:c7:5a:d0:63:90:c5:77:f9:f9:88:db:b0:fe:00: ae:17:92:08:6f:95:0f:32:d3:83:95:f7:e0:69:45:e3: a8:2c:ea:89:cb:f2:f3:ff:1f:47:79:e0:6a:66:f5:77: a5:b7:32:2e:45:09:95:5b:84:f9:da:61:a9:13:94:22 Fingerprint (MD5): 6B:18:C8:4D:ED:79:93:7F:B4:07:E0:0E:55:0B:F1:21 Fingerprint (SHA1): 93:1E:4F:07:E3:65:7A:1C:8B:95:53:0E:81:B5:F7:50:51:D7:56:97 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3350: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3351: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174803 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3352: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3353: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3354: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3355: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174804 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3356: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3357: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3358: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3359: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174805 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3360: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3361: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3362: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3363: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 326174806 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3364: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der chains.sh: #3365: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3366: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3367: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 326174807 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3368: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der chains.sh: #3369: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3370: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3371: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3372: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3373: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3374: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174803 (0x13710853) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:43 2012 Not After : Sun Mar 26 21:47:43 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:7a:dd:0a:9c:64:52:77:f9:60:e0:d6:4d:bb:0d:a1: bf:db:bd:cf:44:06:56:18:33:56:10:58:b9:1d:1e:8e: e0:12:6d:cc:d9:5f:15:6a:de:a9:95:20:ff:d9:24:e5: a9:a0:96:82:4a:d6:a4:12:20:1a:e2:a1:f9:7a:97:07: 0a:7e:32:77:26:8a:c3:08:f3:17:71:4d:98:fa:6a:ea: 2c:89:f7:2b:4b:d9:fa:99:b4:a4:23:36:ad:af:27:51: 42:f9:60:bf:63:65:36:09:8b:9c:2a:1b:49:6f:10:75: 9f:f2:5e:c5:fb:e8:72:f9:04:4b:64:2e:3a:a6:1c:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 74:d2:cb:a0:3f:dc:53:34:6a:b1:2b:9d:23:8c:5e:95: ba:20:8f:cf:ee:f0:97:9c:16:fc:d8:25:66:0e:db:31: 0a:04:37:1c:b0:8d:6f:86:f6:5b:3f:4e:f0:bf:87:70: ed:c6:9c:90:74:25:4b:d7:b4:74:89:b6:29:7c:ef:b6: 86:58:e0:6d:c6:c6:70:c4:52:c5:38:16:91:f2:cb:e9: 1b:2e:df:f8:32:fb:a6:a0:1c:10:c9:26:d1:2f:2b:2d: c2:6d:b7:a8:cc:a2:87:ee:9d:ee:08:2e:a2:e6:bf:2c: f2:a3:e2:5e:ac:99:1b:0b:eb:f5:56:09:c9:b4:c9:ce Fingerprint (MD5): D7:50:DB:FC:6F:2E:EC:F1:DE:33:40:07:A5:C3:D7:86 Fingerprint (SHA1): 35:00:77:A2:31:E7:00:B5:2C:43:8B:A3:2D:F6:8A:1C:78:87:2E:CB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3375: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3376: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174804 (0x13710854) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:43 2012 Not After : Sun Mar 26 21:47:43 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:a8:56:d0:1c:e1:c8:53:61:8a:4c:85:57:0a:b2:4c: 37:47:34:70:a0:c9:d6:f3:0c:3a:48:61:f2:0a:d6:a8: 47:55:ea:5a:81:41:db:24:86:87:e0:57:f3:fa:22:52: 82:a1:4b:48:51:0a:b6:39:8e:f2:f0:dd:27:1c:16:6a: 7b:a9:a5:5d:ce:03:aa:f6:01:e4:6d:28:65:ce:3b:4c: 27:f9:19:1b:2e:21:a9:c1:bd:6f:11:a4:41:6c:79:60: 5e:a6:79:bc:c3:5f:28:c3:84:8b:0f:3b:56:53:65:cd: da:14:cd:c8:9b:4b:29:cd:87:4d:73:e0:65:a8:75:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b9:ba:ab:2d:a3:af:06:82:fa:71:dc:20:5a:03:f1:e8: c7:c6:5d:5b:ed:a0:89:8b:4d:35:d3:b2:55:da:10:4d: d9:88:c1:d4:0c:10:cb:35:40:0b:25:91:b2:d2:0a:ef: e7:33:8d:b6:68:14:e4:9c:78:75:64:ed:a3:01:77:19: ec:58:c8:3e:a4:23:cd:2a:53:d4:e5:d7:1f:19:5b:bc: eb:eb:f5:2a:0b:a6:92:1c:91:a0:9b:3a:f0:93:6e:0e: c8:ad:a0:b5:81:be:63:0e:1b:84:75:92:33:09:20:aa: 97:50:22:11:8d:e0:19:0c:2b:c8:c1:60:83:4a:73:1a Fingerprint (MD5): CE:FE:87:F0:4D:0F:DE:A5:53:D0:04:5C:91:80:91:4D Fingerprint (SHA1): 29:5A:CE:D2:8C:CB:74:E1:A5:75:65:10:78:F5:6C:37:39:D0:03:14 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3377: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3378: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3379: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174805 (0x13710855) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:47:43 2012 Not After : Sun Mar 26 21:47:43 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:71:06:af:ef:69:3b:79:62:ca:f6:19:14:82:20:a3: c7:9d:9f:98:d0:e6:ad:9f:48:75:88:5c:4c:59:20:01: ad:7b:e8:f6:23:cb:c8:b0:d4:e8:e8:d3:bf:78:34:06: 70:13:be:93:17:9d:30:89:21:7a:eb:e0:ee:2d:b1:0d: cc:56:07:7f:76:4a:8c:11:a4:13:c2:9b:1b:4c:bc:60: 01:59:d8:94:98:d8:d0:18:00:4a:22:92:cc:26:5e:8d: a8:0c:1e:62:38:97:3f:98:3c:fb:ec:9e:ee:1d:62:af: 59:7d:4f:e7:a7:c2:97:c4:79:eb:50:0c:96:c8:53:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:9e:18:b6:d9:11:83:ec:e2:a6:e7:34:ea:b8:0c:9d: c7:c0:c9:3e:c8:45:b1:f8:84:d9:b9:4b:e6:fe:46:8d: 90:36:70:cb:ce:a8:6e:90:07:83:f9:64:63:ee:ae:2b: 3f:01:a5:b2:5e:85:c6:f5:1a:aa:67:49:c1:71:ca:41: 1a:92:03:f2:5f:1c:cc:9e:36:9e:ca:c3:94:b7:9f:4e: 0d:66:36:31:49:83:89:66:e2:2f:13:f6:c6:cb:40:55: 94:8c:d9:e9:ce:35:1a:82:8a:4d:ac:8f:3b:c9:19:bb: d9:34:1d:2c:04:cc:ae:9d:b2:db:c2:3b:ef:1f:18:ac Fingerprint (MD5): D6:4A:97:6E:E4:B3:C5:18:09:02:E6:E2:65:92:4B:61 Fingerprint (SHA1): E0:13:42:44:D2:AE:21:F2:A7:F3:C8:96:2A:26:0B:0F:47:C0:F2:E8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3380: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3381: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174808 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3382: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3383: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3384: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3385: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174809 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3386: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3387: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3388: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3389: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174810 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-CA1Root-326174718.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3390: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3391: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3392: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3393: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174811 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3394: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #3395: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3396: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3397: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174812 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3398: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3399: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3400: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174813 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3401: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3402: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3403: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3404: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174814 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3405: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #3406: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174815 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3407: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #3408: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3409: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3410: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3411: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174816 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-Bridge-326174719.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3412: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #3413: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3414: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3415: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174817 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3416: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3417: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3418: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3419: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174818 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3420: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3421: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3422: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174819 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3423: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3424: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3425: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3426: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174820 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3427: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #3428: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174821 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3429: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #3430: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3431: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3432: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3433: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174822 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-Bridge-326174720.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3434: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #3435: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3436: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3437: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174823 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3438: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3439: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3440: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3441: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326174824 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-BridgeNavy-326174721.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3442: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #3443: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3444: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3445: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174825 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3446: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #3447: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3448: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3449: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174826 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3450: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3451: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3452: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174827 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3453: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3454: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #3455: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3456: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 326174828 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3457: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der chains.sh: #3458: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #3459: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3460: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 326174829 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3461: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der chains.sh: #3462: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3463: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3464: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 326174830 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3465: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der chains.sh: #3466: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 326174831 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3467: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der chains.sh: #3468: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #3469: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3470: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3471: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174832 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3472: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #3473: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3474: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3475: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326174833 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3476: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #3477: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3478: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3479: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174834 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3480: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3481: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3482: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3483: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174835 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3484: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #3485: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3486: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174826 (0x1371086a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:47:49 2012 Not After : Sun Mar 26 21:47:49 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:46:f2:ab:9b:11:52:87:4c:e0:e7:5a:3e:2d:78:ab: 95:e4:55:6b:8c:ad:1d:42:63:67:ab:0e:71:32:6d:26: 7d:38:63:9f:ff:2e:ac:75:f2:71:01:04:11:4f:d1:96: f1:12:43:9d:cf:fd:41:25:be:a2:81:f2:76:ba:7a:6b: 2c:b1:ef:93:0f:23:fc:34:78:7e:49:4b:0f:92:4f:3a: 35:1d:e1:84:65:e2:e0:0f:1a:50:55:3f:fb:37:3d:1b: bd:72:66:a0:a0:ad:62:c0:e7:4e:be:38:b3:da:0f:6c: c5:97:83:70:96:2f:31:03:5d:da:f1:49:40:6a:8c:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 38:3f:52:b4:49:1c:68:a0:7a:d5:be:a6:ad:51:1e:91: d5:8d:84:49:62:f7:6a:ab:83:9c:f8:b2:79:fc:01:dc: 35:02:78:18:a9:b3:46:e9:09:83:3e:0d:05:8c:12:f4: a5:3c:d8:f7:50:c2:17:e5:2e:0f:fb:13:a7:cc:a0:be: 2a:95:8e:78:77:8c:37:5d:58:22:c7:02:5d:98:6b:4a: 39:73:ca:a8:d2:d8:f2:6e:f0:8b:92:2f:51:cc:ae:4b: af:10:dd:f4:fd:e4:cd:97:51:da:88:30:6b:fe:55:f5: 48:a3:ae:25:37:02:22:83:7f:dd:38:64:62:b2:f7:f4 Fingerprint (MD5): BE:C6:89:ED:E6:3C:E0:13:D2:21:AD:94:B5:C1:2E:D4 Fingerprint (SHA1): 1B:E3:63:5E:FD:78:98:53:51:6D:FA:89:96:FD:42:59:7F:E0:6B:F4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #3487: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3488: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3489: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3490: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3491: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3492: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3493: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3494: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3495: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174827 (0x1371086b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:47:49 2012 Not After : Sun Mar 26 21:47:49 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:37:20:ef:19:b1:c7:10:85:2d:9b:92:de:b9:00:6f: d9:f5:d6:86:b5:a5:1b:aa:ec:0c:df:3a:76:8f:b7:80: f2:de:c2:72:d5:8f:7c:48:b7:2b:2f:90:ab:e7:6a:61: 24:55:aa:62:27:b1:83:52:0e:fa:4e:ad:b7:62:1f:92: d2:dc:af:37:ed:5b:1d:37:61:d9:0c:da:f3:59:55:04: c0:77:d0:13:0e:85:81:e9:8e:90:d6:f1:ec:e7:cd:67: 27:38:54:07:a0:b1:94:6f:52:fd:5a:dd:12:48:e2:32: d1:11:53:3f:6d:7c:41:27:b3:33:02:50:02:a4:16:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1f:e3:be:d0:b9:37:7b:cd:79:12:af:64:f6:af:9e:ae: 6b:26:75:0d:56:a4:86:ed:37:4f:b0:c5:9a:02:b2:4e: d4:1d:fc:ee:5f:77:b3:0d:eb:f8:a9:c2:53:dc:3b:05: 64:89:0f:f2:4a:64:5d:2e:04:77:b6:c9:f8:9d:c6:0f: 60:0f:c0:25:a2:a5:e2:38:6f:06:3b:78:ef:1c:1e:ef: dd:3f:0f:6d:c8:f2:b4:b9:24:e5:87:ed:39:3d:ac:95: 67:8a:1b:40:0b:96:04:11:1a:20:ac:24:23:2d:aa:62: 45:10:ea:bc:10:96:7b:a9:40:26:4d:76:60:1b:87:5d Fingerprint (MD5): 19:90:91:EC:07:EE:12:5B:3F:4D:3B:B0:DD:88:87:85 Fingerprint (SHA1): 14:1B:14:6C:B4:C0:E5:04:E5:B5:FC:CA:CD:29:34:9E:DE:AA:2A:66 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #3496: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3497: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3498: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3499: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3500: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3501: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3502: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #3503: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #3504: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #3505: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #3506: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #3507: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #3508: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #3509: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3510: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3511: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig n, Inc.",C=US" Validity: Not Before: Wed Nov 08 00:00:00 2006 Not After : Sun Nov 07 23:59:59 2021 Subject: "CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve riSign Trust Network,O="VeriSign, Inc.",C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: CRL Distribution Points Distribution point: URI: "http://crl.verisign.com/pca3.crl" Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: OID.1.3.6.1.5.5.7.1.12 Data: Sequence { [1]: { [0]: { Sequence { Sequence { Sequence { "image/gif" Sequence { Sequence { Sequence { SHA-1 } 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: 80:6a:d4:48:18:2c:7b:19:2e } } Sequence { "http://logo.verisign.com/vslogo.gif" } } } } } } } Name: Certificate Policies Data: Policy Name: Certificate Policies AnyPolicy Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Qualifier Data: "https://www.verisign.com/cps" Name: Certificate Subject Key ID Data: 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: af:33:31:33 Name: Certificate Authority Key Identifier Issuer: Directory Name: "OU=Class 3 Public Primary Certification Auth ority,O="VeriSign, Inc.",C=US" Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 Fingerprint (MD5): C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C Fingerprint (SHA1): 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= US,serialNumber=3014267,businessCategory=Private Organization,incorporati onState=Delaware,incorporationCountry=US" Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network ,O="VeriSign, Inc.",C=US" Returned value is 0, expected result is pass chains.sh: #3512: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #3513: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3514: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174836 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3515: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3516: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3517: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3518: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174837 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3519: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3520: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3521: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3522: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174838 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3523: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3524: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3525: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3526: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 326174839 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3527: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der chains.sh: #3528: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3529: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3530: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174840 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3531: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #3532: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3533: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3534: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 326174841 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3535: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der chains.sh: #3536: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3537: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3538: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 326174842 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3539: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der chains.sh: #3540: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #3541: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3542: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 326174843 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3543: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der chains.sh: #3544: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3545: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3546: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 326174844 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3547: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der chains.sh: #3548: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3549: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174836 (0x13710874) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:53 2012 Not After : Sun Mar 26 21:47:53 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 2a:a4:f2:a1:6f:2c:e9:23:70:b8:1d:f4:c8:51:4a:4b: eb:86:6a:31:14:11:e9:6e:f0:4a:ae:35:2c:a5:1a:17: 21:92:2a:c1:d2:f7:d3:fa:86:46:6c:e0:fc:f5:a5:20: c3:31:ec:ab:b7:9c:e5:0f:f9:f4:f3:f4:8c:31:25:45: dd:5b:60:c4:92:c8:b8:c7:20:b4:a9:d9:8e:69:84:ba: 6c:44:55:4a:8a:1c:9c:21:b9:30:9f:37:d4:59:b0:43: a1:fc:6d:90:ae:cb:9d:21:bc:7f:e1:09:3a:c3:03:40: 84:04:df:11:d4:91:3a:bd:e7:79:8d:9e:d9:2b:1b:63 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:5c:56:a1:b3:06:7e:fe:38:9e:2e:6d:aa: 88:8d:3d:89:08:1a:3b:dd:02:14:7e:93:0e:75:42:50: 2e:9a:47:8f:26:68:b6:16:b1:8a:af:51:77:e9 Fingerprint (MD5): D7:1B:D9:35:6F:95:63:8B:1E:5B:6C:E4:56:7C:AF:4B Fingerprint (SHA1): C2:F0:AE:D9:31:C9:E3:D6:62:AC:43:EF:B5:45:5B:ED:E8:BE:4A:A7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3550: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174836 (0x13710874) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:53 2012 Not After : Sun Mar 26 21:47:53 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 2a:a4:f2:a1:6f:2c:e9:23:70:b8:1d:f4:c8:51:4a:4b: eb:86:6a:31:14:11:e9:6e:f0:4a:ae:35:2c:a5:1a:17: 21:92:2a:c1:d2:f7:d3:fa:86:46:6c:e0:fc:f5:a5:20: c3:31:ec:ab:b7:9c:e5:0f:f9:f4:f3:f4:8c:31:25:45: dd:5b:60:c4:92:c8:b8:c7:20:b4:a9:d9:8e:69:84:ba: 6c:44:55:4a:8a:1c:9c:21:b9:30:9f:37:d4:59:b0:43: a1:fc:6d:90:ae:cb:9d:21:bc:7f:e1:09:3a:c3:03:40: 84:04:df:11:d4:91:3a:bd:e7:79:8d:9e:d9:2b:1b:63 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:5c:56:a1:b3:06:7e:fe:38:9e:2e:6d:aa: 88:8d:3d:89:08:1a:3b:dd:02:14:7e:93:0e:75:42:50: 2e:9a:47:8f:26:68:b6:16:b1:8a:af:51:77:e9 Fingerprint (MD5): D7:1B:D9:35:6F:95:63:8B:1E:5B:6C:E4:56:7C:AF:4B Fingerprint (SHA1): C2:F0:AE:D9:31:C9:E3:D6:62:AC:43:EF:B5:45:5B:ED:E8:BE:4A:A7 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3551: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174836 (0x13710874) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:53 2012 Not After : Sun Mar 26 21:47:53 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 2a:a4:f2:a1:6f:2c:e9:23:70:b8:1d:f4:c8:51:4a:4b: eb:86:6a:31:14:11:e9:6e:f0:4a:ae:35:2c:a5:1a:17: 21:92:2a:c1:d2:f7:d3:fa:86:46:6c:e0:fc:f5:a5:20: c3:31:ec:ab:b7:9c:e5:0f:f9:f4:f3:f4:8c:31:25:45: dd:5b:60:c4:92:c8:b8:c7:20:b4:a9:d9:8e:69:84:ba: 6c:44:55:4a:8a:1c:9c:21:b9:30:9f:37:d4:59:b0:43: a1:fc:6d:90:ae:cb:9d:21:bc:7f:e1:09:3a:c3:03:40: 84:04:df:11:d4:91:3a:bd:e7:79:8d:9e:d9:2b:1b:63 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:5c:56:a1:b3:06:7e:fe:38:9e:2e:6d:aa: 88:8d:3d:89:08:1a:3b:dd:02:14:7e:93:0e:75:42:50: 2e:9a:47:8f:26:68:b6:16:b1:8a:af:51:77:e9 Fingerprint (MD5): D7:1B:D9:35:6F:95:63:8B:1E:5B:6C:E4:56:7C:AF:4B Fingerprint (SHA1): C2:F0:AE:D9:31:C9:E3:D6:62:AC:43:EF:B5:45:5B:ED:E8:BE:4A:A7 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3552: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174836 (0x13710874) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:53 2012 Not After : Sun Mar 26 21:47:53 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 2a:a4:f2:a1:6f:2c:e9:23:70:b8:1d:f4:c8:51:4a:4b: eb:86:6a:31:14:11:e9:6e:f0:4a:ae:35:2c:a5:1a:17: 21:92:2a:c1:d2:f7:d3:fa:86:46:6c:e0:fc:f5:a5:20: c3:31:ec:ab:b7:9c:e5:0f:f9:f4:f3:f4:8c:31:25:45: dd:5b:60:c4:92:c8:b8:c7:20:b4:a9:d9:8e:69:84:ba: 6c:44:55:4a:8a:1c:9c:21:b9:30:9f:37:d4:59:b0:43: a1:fc:6d:90:ae:cb:9d:21:bc:7f:e1:09:3a:c3:03:40: 84:04:df:11:d4:91:3a:bd:e7:79:8d:9e:d9:2b:1b:63 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:5c:56:a1:b3:06:7e:fe:38:9e:2e:6d:aa: 88:8d:3d:89:08:1a:3b:dd:02:14:7e:93:0e:75:42:50: 2e:9a:47:8f:26:68:b6:16:b1:8a:af:51:77:e9 Fingerprint (MD5): D7:1B:D9:35:6F:95:63:8B:1E:5B:6C:E4:56:7C:AF:4B Fingerprint (SHA1): C2:F0:AE:D9:31:C9:E3:D6:62:AC:43:EF:B5:45:5B:ED:E8:BE:4A:A7 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #3553: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3554: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3555: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3556: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3557: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3558: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3559: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #3560: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3561: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3562: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3563: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #3564: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3565: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3566: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3567: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #3568: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #3569: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3570: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3571: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der chains.sh: #3572: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3573: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3574: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3575: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #3576: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3577: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3578: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3579: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #3580: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326214756Z nextupdate=20130326214756Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:47:56 2012 Next Update: Tue Mar 26 21:47:56 2013 CRL Extensions: chains.sh: #3581: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214756Z nextupdate=20130326214756Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:47:56 2012 Next Update: Tue Mar 26 21:47:56 2013 CRL Extensions: chains.sh: #3582: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214756Z nextupdate=20130326214756Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:47:56 2012 Next Update: Tue Mar 26 21:47:56 2013 CRL Extensions: chains.sh: #3583: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326214757Z nextupdate=20130326214757Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:47:57 2012 Next Update: Tue Mar 26 21:47:57 2013 CRL Extensions: chains.sh: #3584: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214758Z addcert 14 20120326214758Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:47:58 2012 Next Update: Tue Mar 26 21:47:56 2013 Entry (1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 26 21:47:58 2012 CRL Extensions: chains.sh: #3585: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214759Z addcert 15 20120326214759Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:47:59 2012 Next Update: Tue Mar 26 21:47:56 2013 Entry (1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 26 21:47:59 2012 CRL Extensions: chains.sh: #3586: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3587: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3588: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3589: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #3590: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #3591: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #3592: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #3593: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #3594: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #3595: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:55 2012 Not After : Sun Mar 26 21:47:55 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:ae:41:0a:ea:fd:f7:64:99:7f:d3:5f:d9:fb:0b:44: b2:49:54:b8:d6:87:79:28:93:be:25:fe:ca:87:25:fd: 3c:c1:cc:9b:76:a9:a7:ab:68:4c:d8:b4:23:3d:07:02: 3d:98:e9:c6:5c:9c:b7:90:58:3b:ed:f5:5d:1d:8c:71: 4b:dc:c1:59:a2:cd:92:fb:28:1e:11:65:36:08:4b:a0: a9:c4:4a:05:df:39:fd:a9:90:03:1a:71:5d:d1:ff:fe: 17:f4:13:a2:57:80:8f:ca:20:e4:82:33:8a:af:96:63: 93:83:cd:8e:37:4a:6e:83:ec:e3:e0:39:a8:7a:67:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a8:e3:ba:2d:2f:e6:89:8c:fd:b6:67:3a:f4:3f:61:cc: 52:70:bf:e5:3d:25:16:73:19:96:1a:bd:c5:74:d7:23: ed:45:ca:61:2c:a9:92:d4:51:e9:06:8e:99:fb:14:bf: ac:8d:75:f7:c3:1f:a0:af:a6:69:3d:d6:ca:b8:6b:ed: ae:0c:b2:ca:e7:d0:7d:8f:b2:51:0c:7a:c0:09:5c:40: e1:da:c8:9c:2d:a6:96:3c:15:d3:01:90:08:89:f5:5f: 65:61:bc:cf:65:57:60:2f:c2:7d:c6:5e:d9:34:be:7a: 10:7e:b1:86:3c:a0:19:4b:7a:a9:16:bb:3e:ae:34:ea Fingerprint (MD5): E9:50:07:79:71:A9:B9:0B:10:E5:2E:F5:37:0D:09:2D Fingerprint (SHA1): CB:5A:CA:D6:EF:55:D6:7A:93:F0:FA:EE:A1:AE:EB:EB:7E:73:85:4F Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3596: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3597: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:47:55 2012 Not After : Sun Mar 26 21:47:55 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:ae:41:0a:ea:fd:f7:64:99:7f:d3:5f:d9:fb:0b:44: b2:49:54:b8:d6:87:79:28:93:be:25:fe:ca:87:25:fd: 3c:c1:cc:9b:76:a9:a7:ab:68:4c:d8:b4:23:3d:07:02: 3d:98:e9:c6:5c:9c:b7:90:58:3b:ed:f5:5d:1d:8c:71: 4b:dc:c1:59:a2:cd:92:fb:28:1e:11:65:36:08:4b:a0: a9:c4:4a:05:df:39:fd:a9:90:03:1a:71:5d:d1:ff:fe: 17:f4:13:a2:57:80:8f:ca:20:e4:82:33:8a:af:96:63: 93:83:cd:8e:37:4a:6e:83:ec:e3:e0:39:a8:7a:67:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a8:e3:ba:2d:2f:e6:89:8c:fd:b6:67:3a:f4:3f:61:cc: 52:70:bf:e5:3d:25:16:73:19:96:1a:bd:c5:74:d7:23: ed:45:ca:61:2c:a9:92:d4:51:e9:06:8e:99:fb:14:bf: ac:8d:75:f7:c3:1f:a0:af:a6:69:3d:d6:ca:b8:6b:ed: ae:0c:b2:ca:e7:d0:7d:8f:b2:51:0c:7a:c0:09:5c:40: e1:da:c8:9c:2d:a6:96:3c:15:d3:01:90:08:89:f5:5f: 65:61:bc:cf:65:57:60:2f:c2:7d:c6:5e:d9:34:be:7a: 10:7e:b1:86:3c:a0:19:4b:7a:a9:16:bb:3e:ae:34:ea Fingerprint (MD5): E9:50:07:79:71:A9:B9:0B:10:E5:2E:F5:37:0D:09:2D Fingerprint (SHA1): CB:5A:CA:D6:EF:55:D6:7A:93:F0:FA:EE:A1:AE:EB:EB:7E:73:85:4F Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3598: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3599: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED ./chains.sh: line 806: ping: command not found OCSP server not accessible, skipping OCSP tests chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3600: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174845 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3601: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3602: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3603: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3604: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 326174846 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3605: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #3606: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3607: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 /localhost-18664-CA0-326174735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3608: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326174722.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3609: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #3610: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3611: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-CA0-326174735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3612: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 326174847 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3613: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #3614: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3615: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 /localhost-18664-CA0-326174735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3616: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326174723.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3617: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #3618: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3619: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3620: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 326174848 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3621: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #3622: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3623: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-CA0-326174735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3624: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326174724.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3625: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der chains.sh: #3626: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3627: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-CA0-326174735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3628: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326174725.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3629: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der chains.sh: #3630: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326214802Z nextupdate=20130326214802Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:48:02 2012 Next Update: Tue Mar 26 21:48:02 2013 CRL Extensions: chains.sh: #3631: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214802Z nextupdate=20130326214802Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:48:02 2012 Next Update: Tue Mar 26 21:48:02 2013 CRL Extensions: chains.sh: #3632: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214802Z nextupdate=20130326214802Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:48:02 2012 Next Update: Tue Mar 26 21:48:02 2013 CRL Extensions: chains.sh: #3633: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326214802Z nextupdate=20130326214802Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:48:02 2012 Next Update: Tue Mar 26 21:48:02 2013 CRL Extensions: chains.sh: #3634: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214803Z addcert 20 20120326214803Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:48:03 2012 Next Update: Tue Mar 26 21:48:02 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:48:03 2012 CRL Extensions: chains.sh: #3635: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214804Z addcert 40 20120326214804Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:48:04 2012 Next Update: Tue Mar 26 21:48:02 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:48:03 2012 Entry (2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:48:04 2012 CRL Extensions: chains.sh: #3636: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3637: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3638: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3639: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined TIMESTAMP chains END: Mon Mar 26 17:48:04 EDT 2012 chains.sh: Testing with upgraded library =============================== cp: cannot stat `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eccurves': No such file or directory cp: cannot stat `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Mon Mar 26 17:48:05 EDT 2012 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #3640: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #3641: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #3642: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #3643: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #3644: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #3645: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #3646: Upgrading dave - PASSED eccurves skipping db eccurves dbupgrade.sh: #3647: No directory eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #3648: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #3649: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #3650: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #3651: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #3652: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #3653: Upgrading serverCA - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #3654: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... dbupgrade.sh: #3655: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Mon Mar 26 17:48:23 EDT 2012 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 26 17:48:23 EDT 2012 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3656: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:bd:6c:43:dc:67:4f:09:dd:38:c0:f3:63:71:77:2d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3657: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3658: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3659: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 11:e7:dc:75:36:df:a3:f4:ed:d9:c7:24:c7:09:8d:65 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3660: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3661: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3662: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 22:ea:06:4e:92:7f:30:14:94:22:31:c1:a6:f2:84:cf Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3663: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3664: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3665: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 39:7b:78:e7:cb:80:34:dc:d0:ac:86:68:b6:ef:e4:af Iteration Count: 1 (0x1) tools.sh: #3666: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3667: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3668: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6c:5d:81:87:8f:cc:f5:47:bd:ec:53:b9:17:3e:2e:78 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3669: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3670: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3671: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b8:6b:80:f3:e6:0b:01:01:59:df:83:7c:9f:48:d2:57 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3672: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3673: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3674: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d1:72:68:24:4c:bf:93:24:bc:3f:32:69:17:c2:6a:44 Iteration Count: 1 (0x1) tools.sh: #3675: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3676: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3677: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:e8:2b:02:89:61:ca:cc:c9:f1:ac:25:d2:f6:68:eb Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:59:cc:74:b1:2a:68:61:73:49:9e:4a:85:89:30: e4:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3678: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3679: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3680: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b0:01:c1:17:82:5b:ce:5b:27:0a:e1:0a:90:44:fc:a7 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:b8:83:35:5e:bb:15:1b:b3:3f:43:97:68:5e:58: 11:34 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3681: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3682: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3683: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1a:26:d6:60:a0:47:43:97:db:31:43:6e:53:b2:86:60 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:7b:c6:e9:22:e0:66:bf:cc:7a:d5:fd:e9:94:1f: 6f:56 tools.sh: #3684: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3685: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3686: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e6:78:56:4a:e7:f8:e0:9c:e6:16:58:c0:ce:f3:ef:9b Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:9d:7b:96:4b:9c:f6:83:50:05:ed:8d:ac:ba:47: 5b:a6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3687: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3688: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3689: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 25:56:8c:95:11:88:af:7a:0c:26:fb:c4:f3:47:77:71 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:6b:86:70:05:46:ef:5f:6a:51:50:7b:ec:f6:c3: 63:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3690: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3691: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3692: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 82:ce:5e:9d:33:4c:44:72:2d:cf:58:82:fe:32:58:21 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:72:e6:89:44:8c:bb:40:03:56:64:b8:f8:dd:19: 11:58 tools.sh: #3693: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3694: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3695: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ac:cf:7f:d7:4c:9d:06:ec:01:eb:03:69:05:0d:45:1f Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:fe:63:6c:39:08:94:4f:24:9a:8a:0b:d4:d5:57: 71:3e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3696: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3697: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3698: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 31:dd:d7:fb:b7:fc:c7:12:61:cd:8a:b7:54:1d:a2:f3 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:33:e5:e6:93:6e:99:59:a7:6d:61:c9:39:6f:3e: 58:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3699: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3700: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3701: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bb:2b:3e:63:99:c8:f6:1f:2d:e3:0b:89:b9:14:e0:5b Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:97:7d:95:74:f9:6d:51:a6:65:1d:b5:32:a2:68: 1d:b7 tools.sh: #3702: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3703: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3704: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 82:82:62:f2:82:45:5a:87:8d:59:44:44:50:99:4b:32 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:49:a1:26:3b:e1:e8:f0:bd:3b:68:ea:00:58:d3: 83:bc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3705: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3706: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3707: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:62:cf:85:e9:88:4f:20:74:90:f8:cb:14:dd:3b:ab Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:80:ad:f6:6a:e6:74:d2:39:ca:b7:1a:b3:55:2d: 6f:d7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3708: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3709: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3710: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:a7:af:27:f1:3b:6b:a0:c0:05:24:45:04:9b:3f:f3 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:88:04:e9:8a:af:e0:24:8e:6e:1e:6f:fb:cf:df: 25:cc tools.sh: #3711: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3712: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3713: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f9:b1:51:18:1e:e3:b3:33:37:79:45:a4:b6:a1:fb:5a Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:a0:d2:1b:02:e1:64:8b:28:47:5c:57:82:ea:d7: b0:81 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3714: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3715: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3716: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:bb:dd:90:60:e0:33:dd:93:51:20:ed:0a:69:55:0d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:57:09:4b:41:b8:f9:6c:aa:34:71:d8:f1:9f:58: 14:87 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3717: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3718: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3719: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:25:62:a8:35:d4:aa:f2:10:4e:03:3b:6d:c6:22:3b Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:8b:9f:57:cb:bb:05:bb:80:ca:a2:32:0d:e6:ea: d4:d4 tools.sh: #3720: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3721: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3722: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 85:4c:20:ab:cd:ff:dc:cd:69:71:f5:92:60:53:29:7d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:d4:3a:d7:a7:89:9c:58:68:80:24:77:17:57:0d: 1d:28 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3723: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3724: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3725: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bf:7f:19:fe:a6:7d:24:49:a8:a4:28:5f:88:e8:77:e4 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:3e:8c:36:30:75:41:af:9d:f5:cd:7a:24:80:93: 84:70 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3726: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3727: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3728: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 22:96:56:4b:15:a4:76:04:65:8a:7f:79:de:c2:8c:bc Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:67:1f:0b:23:73:6a:b5:51:c4:6b:09:e0:3c:09: d0:00 tools.sh: #3729: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3730: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3731: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 93:ec:82:0e:2f:8d:ec:eb:a5:0d:78:85:33:ed:e1:71 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3732: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3733: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3734: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d7:ac:e9:3a:11:6e:2b:fc:40:da:1a:a1:2b:8f:e1:25 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3735: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3736: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3737: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 4f:f5:2d:d1:7b:68:b3:73:73:5a:e4:60:b8:41:58:63 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3738: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3739: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3740: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8a:1c:67:4d:ac:c7:14:9c:78:a0:c1:d3:0a:13:01:e0 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3741: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3742: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3743: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d0:c5:ba:fd:1e:56:03:8e:b0:d9:62:71:8c:d4:5d:f7 Iteration Count: 1 (0x1) tools.sh: #3744: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3745: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3746: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 97:2f:53:f5:66:95:98:dd:19:db:b9:a0:05:f2:a5:bb Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3747: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3748: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3749: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 1e:8d:6f:59:ad:2c:34:5a:73:07:40:57:f8:52:c6:0a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3750: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3751: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3752: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ac:6d:b3:7f:c9:f8:b6:0e:b0:53:40:7a:f8:4f:7b:cb Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3753: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3754: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3755: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: aa:1a:e1:14:6d:cc:38:48:2a:a2:68:74:95:c2:eb:6d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3756: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3757: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3758: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 08:cd:70:52:19:fb:54:24:bb:92:2a:60:68:92:2c:03 Iteration Count: 1 (0x1) tools.sh: #3759: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3760: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3761: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 47:72:27:67:aa:a2:12:bf:83:e0:e1:de:5f:55:c7:94 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3762: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3763: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3764: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1a:93:b4:d6:8b:36:04:21:e9:eb:58:73:a7:97:5e:25 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3765: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3766: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3767: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 45:ca:f1:4c:c1:cd:b7:e9:a4:6e:dc:b9:41:f8:80:bc Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3768: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3769: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3770: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e3:0f:bf:29:7a:93:64:33:43:d6:6c:c3:b5:9a:b2:65 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3771: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3772: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3773: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 87:23:ff:cf:37:1a:97:12:23:64:19:9d:2d:43:6f:a6 Iteration Count: 1 (0x1) tools.sh: #3774: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3775: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3776: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 68:84:da:5f:c8:bd:17:73:9f:c7:cd:41:c8:0d:91:58 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3777: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3778: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3779: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:c0:3b:bf:51:b8:e5:b8:9f:58:9e:8b:14:42:a2:fe Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3780: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3781: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3782: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:df:46:23:d7:fb:20:95:05:87:e1:b0:92:fa:5a:7c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3783: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3784: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3785: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1b:bf:26:c8:68:a1:c9:f6:33:0f:9e:9b:36:b1:14:d5 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3786: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3787: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3788: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7e:23:3f:a4:40:3a:57:d0:97:16:0d:e6:23:d0:b5:d7 Iteration Count: 1 (0x1) tools.sh: #3789: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3790: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3791: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a4:b0:b1:16:c8:c1:13:27:6b:82:81:20:9d:b7:e5:7f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3792: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3793: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3794: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1d:a2:dd:f9:e2:86:a3:9d:26:bb:28:7f:43:5f:2b:2b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3795: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3796: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3797: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:c4:58:43:72:06:3f:1f:15:26:a3:59:85:80:de:66 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3798: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3799: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3800: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7a:87:e7:7d:9b:6f:30:5f:87:0f:90:23:7f:b7:92:32 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3801: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3802: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3803: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 49:38:ee:ce:14:70:78:c7:85:6c:ed:10:61:62:21:01 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3804: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3805: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3806: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b0:ba:e2:25:13:f2:e0:c7:0c:18:18:c7:5c:f6:61:df Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3807: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3808: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3809: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a6:4d:dc:e1:2e:09:f8:61:69:15:53:bf:f7:c6:08:95 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3810: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3811: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3812: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:33:08:f4:9b:d4:3b:db:84:17:94:e4:b0:6a:8e:27 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3813: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3814: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3815: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0c:8e:cd:c9:f9:e3:9d:2b:97:81:ea:de:19:d9:3b:79 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3816: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3817: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3818: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d0:31:3e:a9:23:6b:40:c4:9b:b1:ee:98:f9:87:88:cb Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:17 2012 Not After : Sun Mar 26 21:41:17 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:37:09:a0:6c:60:09:b7:f9:76:5b:08:95:a1:dd:e6: 5e:a9:57:34:a5:9c:68:6d:51:72:f2:65:7e:0a:e5:be: 45:93:04:72:7d:2b:90:26:80:25:d7:d4:67:b2:1e:4a: eb:8c:77:d5:11:fb:fd:4d:37:27:08:7a:67:c0:fe:04: c8:c1:e3:05:43:87:33:c4:53:b0:88:8d:ec:ba:b7:d9: 99:c0:cd:58:33:1b:cc:7d:58:94:c7:cf:d2:59:79:b6: 9e:1c:1e:e3:d3:8b:0a:62:1c:a5:67:10:83:3e:1a:a1: 11:b5:2a:90:11:a8:9d:f6:13:b4:fa:f9:e7:d4:11:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:cc:4a:36:6e:02:d3:5d:84:bd:c3:f7:a4:a3:60:52: f1:c2:d0:fa:b7:fc:b1:28:06:83:7e:ca:0e:19:34:3c: 74:fe:1e:89:f8:76:9a:ff:73:8c:5f:f4:97:40:3e:7f: 07:e2:f0:d3:d0:17:42:a6:5c:33:84:75:99:ec:d8:c0: 29:64:62:b2:e9:04:db:2a:14:ee:2b:af:11:e7:b4:55: b9:68:32:08:82:63:1b:83:9c:c1:2b:d6:2b:c1:63:6c: 05:75:79:10:f7:bd:2a:ee:a9:e7:7f:68:93:f4:77:d7: 97:be:8c:25:05:93:c0:26:73:ad:29:35:64:9b:8c:6e Fingerprint (MD5): 41:12:69:56:2F:65:7F:20:95:16:4B:ED:0B:2D:0E:C8 Fingerprint (SHA1): 72:D0:4B:51:B5:1F:4D:0D:27:AE:A3:2B:F6:E1:0D:14:81:06:7A:67 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:20 2012 Not After : Sun Mar 26 21:41:20 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:41:f3:15:9f:35:dd:a2:9b:f7:03:13:82:74:bf:b7: 27:3b:fc:29:60:4e:21:04:ba:26:fe:46:66:0f:e0:c0: da:16:90:34:d8:fc:8b:8f:86:d1:18:95:78:af:b5:c2: ae:4f:aa:c5:08:5e:e8:f9:ba:90:c3:33:cb:66:d7:f2: b1:0d:95:41:d2:a9:6c:8e:2a:5d:e3:57:24:5f:1a:0d: b4:1d:fd:59:61:eb:b2:08:3e:cf:f9:10:a1:0a:e5:9e: f3:81:54:de:8a:45:11:e5:dc:b9:ae:f1:54:65:ae:e3: b1:4d:84:9e:18:3a:43:95:c4:81:ce:ce:05:57:d3:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:69:6a:2f:5e:2e:ed:f6:da:7e:22:1e:b3:07:e9:9a: 4c:c6:a0:88:d6:0a:c4:e6:cb:de:5a:8d:64:b2:4c:c8: 2d:5f:d2:0f:f2:29:4f:4e:5b:bd:76:06:b2:8b:f7:c8: 6e:05:0c:bc:ad:e0:41:39:bb:1b:94:09:40:1f:92:d5: 3b:95:c3:2e:29:52:0b:d2:6e:fd:d4:ea:44:d1:30:e5: db:5b:2b:c5:bd:b9:83:29:0f:2a:42:05:70:26:22:0d: 8f:da:f8:15:3e:78:92:64:9e:90:70:1b:32:c1:92:3a: 58:f4:39:b9:ae:69:0d:af:76:6e:44:6f:94:8b:58:32 Fingerprint (MD5): 80:13:2C:BF:37:3B:CD:F0:E1:C3:47:17:38:1A:D9:49 Fingerprint (SHA1): 8B:1F:CE:F4:D6:00:A6:F5:B1:49:C9:9E:8D:DB:5E:77:8C:B7:EF:48 Friendly Name: Alice tools.sh: #3819: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3820: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #3821: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3822: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #3823: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #3824: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #3825: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #3826: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #3827: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #3828: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #3829: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Mar 26 17:48:48 EDT 2012 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 26 17:48:48 EDT 2012 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #3830: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #3831: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1ff02389275f4899ec8a11a67ce777db78fde02a FIPS_PUB_140_Test_Certificate fips.sh: #3832: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #3833: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #3834: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #3835: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #3836: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #3837: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #3838: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #3839: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #3840: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #3841: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #3842: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1ff02389275f4899ec8a11a67ce777db78fde02a FIPS_PUB_140_Test_Certificate fips.sh: #3843: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #3844: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #3845: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #3846: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #3847: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1ff02389275f4899ec8a11a67ce777db78fde02a FIPS_PUB_140_Test_Certificate fips.sh: #3848: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #3849: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #3850: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000f3d73 (998771): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #3851: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 26 17:49:01 EDT 2012 Running tests for crmf TIMESTAMP crmf BEGIN: Mon Mar 26 17:49:01 EDT 2012 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #3852: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #3853: CMMF test . - PASSED TIMESTAMP crmf END: Mon Mar 26 17:49:02 EDT 2012 Running tests for smime TIMESTAMP smime BEGIN: Mon Mar 26 17:49:02 EDT 2012 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #3854: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3855: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3856: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #3857: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #3858: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #3859: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3860: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #3861: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #3862: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #3863: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #3864: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3865: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #3866: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #3867: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #3868: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #3869: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3870: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #3871: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #3872: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #3873: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #3874: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #3875: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #3876: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #3877: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #3878: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #3879: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #3880: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #3881: Decrypt with a Multiple Email cert . - PASSED smime.sh: #3882: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #3883: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #3884: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #3885: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #3886: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #3887: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #3888: Decode Encrypted-Data . - PASSED smime.sh: #3889: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #3890: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #3891: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #3892: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #3893: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #3894: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Mar 26 17:49:04 EDT 2012 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 26 17:49:04 EDT 2012 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12677 >/dev/null 2>/dev/null selfserv_9793 with PID 12677 found at Mon Mar 26 17:49:04 EDT 2012 selfserv_9793 with PID 12677 started at Mon Mar 26 17:49:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3895: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12677 at Mon Mar 26 17:49:04 EDT 2012 kill -USR1 12677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12677 killed at Mon Mar 26 17:49:04 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12733 >/dev/null 2>/dev/null selfserv_9793 with PID 12733 found at Mon Mar 26 17:49:05 EDT 2012 selfserv_9793 with PID 12733 started at Mon Mar 26 17:49:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3896: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12733 at Mon Mar 26 17:49:05 EDT 2012 kill -USR1 12733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12733 killed at Mon Mar 26 17:49:05 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12789 >/dev/null 2>/dev/null selfserv_9793 with PID 12789 found at Mon Mar 26 17:49:05 EDT 2012 selfserv_9793 with PID 12789 started at Mon Mar 26 17:49:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3897: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12789 at Mon Mar 26 17:49:05 EDT 2012 kill -USR1 12789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12789 killed at Mon Mar 26 17:49:05 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12857 >/dev/null 2>/dev/null selfserv_9793 with PID 12857 found at Mon Mar 26 17:49:05 EDT 2012 selfserv_9793 with PID 12857 started at Mon Mar 26 17:49:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3898: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12857 at Mon Mar 26 17:49:05 EDT 2012 kill -USR1 12857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12857 killed at Mon Mar 26 17:49:05 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12913 >/dev/null 2>/dev/null selfserv_9793 with PID 12913 found at Mon Mar 26 17:49:05 EDT 2012 selfserv_9793 with PID 12913 started at Mon Mar 26 17:49:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3899: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12913 at Mon Mar 26 17:49:05 EDT 2012 kill -USR1 12913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12913 killed at Mon Mar 26 17:49:06 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12969 >/dev/null 2>/dev/null selfserv_9793 with PID 12969 found at Mon Mar 26 17:49:06 EDT 2012 selfserv_9793 with PID 12969 started at Mon Mar 26 17:49:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3900: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 12969 at Mon Mar 26 17:49:06 EDT 2012 kill -USR1 12969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12969 killed at Mon Mar 26 17:49:06 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13037 >/dev/null 2>/dev/null selfserv_9793 with PID 13037 found at Mon Mar 26 17:49:07 EDT 2012 selfserv_9793 with PID 13037 started at Mon Mar 26 17:49:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3901: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13037 at Mon Mar 26 17:49:07 EDT 2012 kill -USR1 13037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13037 killed at Mon Mar 26 17:49:07 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13093 >/dev/null 2>/dev/null selfserv_9793 with PID 13093 found at Mon Mar 26 17:49:07 EDT 2012 selfserv_9793 with PID 13093 started at Mon Mar 26 17:49:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3902: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 13093 at Mon Mar 26 17:49:07 EDT 2012 kill -USR1 13093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13093 killed at Mon Mar 26 17:49:07 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13149 >/dev/null 2>/dev/null selfserv_9793 with PID 13149 found at Mon Mar 26 17:49:07 EDT 2012 selfserv_9793 with PID 13149 started at Mon Mar 26 17:49:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3903: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13149 at Mon Mar 26 17:49:07 EDT 2012 kill -USR1 13149 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13149 killed at Mon Mar 26 17:49:07 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13217 >/dev/null 2>/dev/null selfserv_9793 with PID 13217 found at Mon Mar 26 17:49:07 EDT 2012 selfserv_9793 with PID 13217 started at Mon Mar 26 17:49:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3904: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13217 at Mon Mar 26 17:49:08 EDT 2012 kill -USR1 13217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13217 killed at Mon Mar 26 17:49:08 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13273 >/dev/null 2>/dev/null selfserv_9793 with PID 13273 found at Mon Mar 26 17:49:08 EDT 2012 selfserv_9793 with PID 13273 started at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3905: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13273 at Mon Mar 26 17:49:08 EDT 2012 kill -USR1 13273 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13273 killed at Mon Mar 26 17:49:08 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13329 >/dev/null 2>/dev/null selfserv_9793 with PID 13329 found at Mon Mar 26 17:49:08 EDT 2012 selfserv_9793 with PID 13329 started at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3906: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13329 at Mon Mar 26 17:49:08 EDT 2012 kill -USR1 13329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13329 killed at Mon Mar 26 17:49:08 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13397 >/dev/null 2>/dev/null selfserv_9793 with PID 13397 found at Mon Mar 26 17:49:08 EDT 2012 selfserv_9793 with PID 13397 started at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3907: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13397 at Mon Mar 26 17:49:08 EDT 2012 kill -USR1 13397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13397 killed at Mon Mar 26 17:49:08 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13453 >/dev/null 2>/dev/null selfserv_9793 with PID 13453 found at Mon Mar 26 17:49:08 EDT 2012 selfserv_9793 with PID 13453 started at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3908: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13453 at Mon Mar 26 17:49:09 EDT 2012 kill -USR1 13453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13453 killed at Mon Mar 26 17:49:09 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13509 >/dev/null 2>/dev/null selfserv_9793 with PID 13509 found at Mon Mar 26 17:49:09 EDT 2012 selfserv_9793 with PID 13509 started at Mon Mar 26 17:49:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3909: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13509 at Mon Mar 26 17:49:09 EDT 2012 kill -USR1 13509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13509 killed at Mon Mar 26 17:49:09 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13577 >/dev/null 2>/dev/null selfserv_9793 with PID 13577 found at Mon Mar 26 17:49:09 EDT 2012 selfserv_9793 with PID 13577 started at Mon Mar 26 17:49:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3910: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13577 at Mon Mar 26 17:49:09 EDT 2012 kill -USR1 13577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13577 killed at Mon Mar 26 17:49:09 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13633 >/dev/null 2>/dev/null selfserv_9793 with PID 13633 found at Mon Mar 26 17:49:09 EDT 2012 selfserv_9793 with PID 13633 started at Mon Mar 26 17:49:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3911: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 13633 at Mon Mar 26 17:49:09 EDT 2012 kill -USR1 13633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13633 killed at Mon Mar 26 17:49:09 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13689 >/dev/null 2>/dev/null selfserv_9793 with PID 13689 found at Mon Mar 26 17:49:09 EDT 2012 selfserv_9793 with PID 13689 started at Mon Mar 26 17:49:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3912: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 13689 at Mon Mar 26 17:49:10 EDT 2012 kill -USR1 13689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13689 killed at Mon Mar 26 17:49:10 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13757 >/dev/null 2>/dev/null selfserv_9793 with PID 13757 found at Mon Mar 26 17:49:10 EDT 2012 selfserv_9793 with PID 13757 started at Mon Mar 26 17:49:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3913: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 13757 at Mon Mar 26 17:49:10 EDT 2012 kill -USR1 13757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13757 killed at Mon Mar 26 17:49:10 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13813 >/dev/null 2>/dev/null selfserv_9793 with PID 13813 found at Mon Mar 26 17:49:10 EDT 2012 selfserv_9793 with PID 13813 started at Mon Mar 26 17:49:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3914: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 13813 at Mon Mar 26 17:49:10 EDT 2012 kill -USR1 13813 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13813 killed at Mon Mar 26 17:49:10 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13869 >/dev/null 2>/dev/null selfserv_9793 with PID 13869 found at Mon Mar 26 17:49:10 EDT 2012 selfserv_9793 with PID 13869 started at Mon Mar 26 17:49:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3915: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 13869 at Mon Mar 26 17:49:10 EDT 2012 kill -USR1 13869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13869 killed at Mon Mar 26 17:49:10 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13937 >/dev/null 2>/dev/null selfserv_9793 with PID 13937 found at Mon Mar 26 17:49:11 EDT 2012 selfserv_9793 with PID 13937 started at Mon Mar 26 17:49:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3916: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 13937 at Mon Mar 26 17:49:11 EDT 2012 kill -USR1 13937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13937 killed at Mon Mar 26 17:49:11 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13993 >/dev/null 2>/dev/null selfserv_9793 with PID 13993 found at Mon Mar 26 17:49:11 EDT 2012 selfserv_9793 with PID 13993 started at Mon Mar 26 17:49:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3917: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 13993 at Mon Mar 26 17:49:11 EDT 2012 kill -USR1 13993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13993 killed at Mon Mar 26 17:49:11 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14049 >/dev/null 2>/dev/null selfserv_9793 with PID 14049 found at Mon Mar 26 17:49:11 EDT 2012 selfserv_9793 with PID 14049 started at Mon Mar 26 17:49:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3918: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 14049 at Mon Mar 26 17:49:11 EDT 2012 kill -USR1 14049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14049 killed at Mon Mar 26 17:49:11 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14117 >/dev/null 2>/dev/null selfserv_9793 with PID 14117 found at Mon Mar 26 17:49:11 EDT 2012 selfserv_9793 with PID 14117 started at Mon Mar 26 17:49:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3919: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14117 at Mon Mar 26 17:49:11 EDT 2012 kill -USR1 14117 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14117 killed at Mon Mar 26 17:49:12 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14173 >/dev/null 2>/dev/null selfserv_9793 with PID 14173 found at Mon Mar 26 17:49:12 EDT 2012 selfserv_9793 with PID 14173 started at Mon Mar 26 17:49:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3920: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 14173 at Mon Mar 26 17:49:12 EDT 2012 kill -USR1 14173 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14173 killed at Mon Mar 26 17:49:12 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14236 >/dev/null 2>/dev/null selfserv_9793 with PID 14236 found at Mon Mar 26 17:49:12 EDT 2012 selfserv_9793 with PID 14236 started at Mon Mar 26 17:49:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3921: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14236 at Mon Mar 26 17:49:12 EDT 2012 kill -USR1 14236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14236 killed at Mon Mar 26 17:49:12 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14304 >/dev/null 2>/dev/null selfserv_9793 with PID 14304 found at Mon Mar 26 17:49:12 EDT 2012 selfserv_9793 with PID 14304 started at Mon Mar 26 17:49:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3922: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14304 at Mon Mar 26 17:49:12 EDT 2012 kill -USR1 14304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14304 killed at Mon Mar 26 17:49:12 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14360 >/dev/null 2>/dev/null selfserv_9793 with PID 14360 found at Mon Mar 26 17:49:12 EDT 2012 selfserv_9793 with PID 14360 started at Mon Mar 26 17:49:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3923: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14360 at Mon Mar 26 17:49:13 EDT 2012 kill -USR1 14360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14360 killed at Mon Mar 26 17:49:13 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14416 >/dev/null 2>/dev/null selfserv_9793 with PID 14416 found at Mon Mar 26 17:49:13 EDT 2012 selfserv_9793 with PID 14416 started at Mon Mar 26 17:49:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3924: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14416 at Mon Mar 26 17:49:13 EDT 2012 kill -USR1 14416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14416 killed at Mon Mar 26 17:49:13 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14484 >/dev/null 2>/dev/null selfserv_9793 with PID 14484 found at Mon Mar 26 17:49:13 EDT 2012 selfserv_9793 with PID 14484 started at Mon Mar 26 17:49:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3925: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14484 at Mon Mar 26 17:49:13 EDT 2012 kill -USR1 14484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14484 killed at Mon Mar 26 17:49:13 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14540 >/dev/null 2>/dev/null selfserv_9793 with PID 14540 found at Mon Mar 26 17:49:13 EDT 2012 selfserv_9793 with PID 14540 started at Mon Mar 26 17:49:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3926: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14540 at Mon Mar 26 17:49:13 EDT 2012 kill -USR1 14540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14540 killed at Mon Mar 26 17:49:13 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14596 >/dev/null 2>/dev/null selfserv_9793 with PID 14596 found at Mon Mar 26 17:49:13 EDT 2012 selfserv_9793 with PID 14596 started at Mon Mar 26 17:49:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3927: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14596 at Mon Mar 26 17:49:14 EDT 2012 kill -USR1 14596 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14596 killed at Mon Mar 26 17:49:14 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14664 >/dev/null 2>/dev/null selfserv_9793 with PID 14664 found at Mon Mar 26 17:49:14 EDT 2012 selfserv_9793 with PID 14664 started at Mon Mar 26 17:49:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3928: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14664 at Mon Mar 26 17:49:14 EDT 2012 kill -USR1 14664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14664 killed at Mon Mar 26 17:49:14 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14720 >/dev/null 2>/dev/null selfserv_9793 with PID 14720 found at Mon Mar 26 17:49:14 EDT 2012 selfserv_9793 with PID 14720 started at Mon Mar 26 17:49:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3929: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 14720 at Mon Mar 26 17:49:14 EDT 2012 kill -USR1 14720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14720 killed at Mon Mar 26 17:49:14 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14776 >/dev/null 2>/dev/null selfserv_9793 with PID 14776 found at Mon Mar 26 17:49:14 EDT 2012 selfserv_9793 with PID 14776 started at Mon Mar 26 17:49:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3930: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 14776 at Mon Mar 26 17:49:15 EDT 2012 kill -USR1 14776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14776 killed at Mon Mar 26 17:49:15 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14844 >/dev/null 2>/dev/null selfserv_9793 with PID 14844 found at Mon Mar 26 17:49:15 EDT 2012 selfserv_9793 with PID 14844 started at Mon Mar 26 17:49:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3931: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 14844 at Mon Mar 26 17:49:15 EDT 2012 kill -USR1 14844 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14844 killed at Mon Mar 26 17:49:15 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14901 >/dev/null 2>/dev/null selfserv_9793 with PID 14901 found at Mon Mar 26 17:49:15 EDT 2012 selfserv_9793 with PID 14901 started at Mon Mar 26 17:49:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3932: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 14901 at Mon Mar 26 17:49:15 EDT 2012 kill -USR1 14901 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14901 killed at Mon Mar 26 17:49:15 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 14957 >/dev/null 2>/dev/null selfserv_9793 with PID 14957 found at Mon Mar 26 17:49:15 EDT 2012 selfserv_9793 with PID 14957 started at Mon Mar 26 17:49:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3933: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 14957 at Mon Mar 26 17:49:15 EDT 2012 kill -USR1 14957 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 14957 killed at Mon Mar 26 17:49:15 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15025 >/dev/null 2>/dev/null selfserv_9793 with PID 15025 found at Mon Mar 26 17:49:16 EDT 2012 selfserv_9793 with PID 15025 started at Mon Mar 26 17:49:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3934: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15025 at Mon Mar 26 17:49:16 EDT 2012 kill -USR1 15025 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15025 killed at Mon Mar 26 17:49:16 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15081 >/dev/null 2>/dev/null selfserv_9793 with PID 15081 found at Mon Mar 26 17:49:16 EDT 2012 selfserv_9793 with PID 15081 started at Mon Mar 26 17:49:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3935: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15081 at Mon Mar 26 17:49:16 EDT 2012 kill -USR1 15081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15081 killed at Mon Mar 26 17:49:16 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15137 >/dev/null 2>/dev/null selfserv_9793 with PID 15137 found at Mon Mar 26 17:49:16 EDT 2012 selfserv_9793 with PID 15137 started at Mon Mar 26 17:49:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3936: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15137 at Mon Mar 26 17:49:16 EDT 2012 kill -USR1 15137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15137 killed at Mon Mar 26 17:49:16 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15205 >/dev/null 2>/dev/null selfserv_9793 with PID 15205 found at Mon Mar 26 17:49:16 EDT 2012 selfserv_9793 with PID 15205 started at Mon Mar 26 17:49:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3937: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15205 at Mon Mar 26 17:49:17 EDT 2012 kill -USR1 15205 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15205 killed at Mon Mar 26 17:49:17 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15262 >/dev/null 2>/dev/null selfserv_9793 with PID 15262 found at Mon Mar 26 17:49:17 EDT 2012 selfserv_9793 with PID 15262 started at Mon Mar 26 17:49:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3938: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15262 at Mon Mar 26 17:49:17 EDT 2012 kill -USR1 15262 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15262 killed at Mon Mar 26 17:49:17 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15324 >/dev/null 2>/dev/null selfserv_9793 with PID 15324 found at Mon Mar 26 17:49:17 EDT 2012 selfserv_9793 with PID 15324 started at Mon Mar 26 17:49:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3939: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15324 at Mon Mar 26 17:49:17 EDT 2012 kill -USR1 15324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15324 killed at Mon Mar 26 17:49:17 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15392 >/dev/null 2>/dev/null selfserv_9793 with PID 15392 found at Mon Mar 26 17:49:17 EDT 2012 selfserv_9793 with PID 15392 started at Mon Mar 26 17:49:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3940: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15392 at Mon Mar 26 17:49:17 EDT 2012 kill -USR1 15392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15392 killed at Mon Mar 26 17:49:17 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15450 >/dev/null 2>/dev/null selfserv_9793 with PID 15450 found at Mon Mar 26 17:49:18 EDT 2012 selfserv_9793 with PID 15450 started at Mon Mar 26 17:49:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3941: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15450 at Mon Mar 26 17:49:18 EDT 2012 kill -USR1 15450 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15450 killed at Mon Mar 26 17:49:18 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15506 >/dev/null 2>/dev/null selfserv_9793 with PID 15506 found at Mon Mar 26 17:49:18 EDT 2012 selfserv_9793 with PID 15506 started at Mon Mar 26 17:49:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3942: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15506 at Mon Mar 26 17:49:18 EDT 2012 kill -USR1 15506 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15506 killed at Mon Mar 26 17:49:18 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15574 >/dev/null 2>/dev/null selfserv_9793 with PID 15574 found at Mon Mar 26 17:49:18 EDT 2012 selfserv_9793 with PID 15574 started at Mon Mar 26 17:49:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3943: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15574 at Mon Mar 26 17:49:18 EDT 2012 kill -USR1 15574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15574 killed at Mon Mar 26 17:49:18 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15630 >/dev/null 2>/dev/null selfserv_9793 with PID 15630 found at Mon Mar 26 17:49:18 EDT 2012 selfserv_9793 with PID 15630 started at Mon Mar 26 17:49:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3944: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15630 at Mon Mar 26 17:49:19 EDT 2012 kill -USR1 15630 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15630 killed at Mon Mar 26 17:49:19 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15687 >/dev/null 2>/dev/null selfserv_9793 with PID 15687 found at Mon Mar 26 17:49:19 EDT 2012 selfserv_9793 with PID 15687 started at Mon Mar 26 17:49:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3945: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15687 at Mon Mar 26 17:49:19 EDT 2012 kill -USR1 15687 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15687 killed at Mon Mar 26 17:49:19 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15755 >/dev/null 2>/dev/null selfserv_9793 with PID 15755 found at Mon Mar 26 17:49:19 EDT 2012 selfserv_9793 with PID 15755 started at Mon Mar 26 17:49:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3946: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15755 at Mon Mar 26 17:49:19 EDT 2012 kill -USR1 15755 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15755 killed at Mon Mar 26 17:49:19 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15812 >/dev/null 2>/dev/null selfserv_9793 with PID 15812 found at Mon Mar 26 17:49:19 EDT 2012 selfserv_9793 with PID 15812 started at Mon Mar 26 17:49:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3947: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15812 at Mon Mar 26 17:49:19 EDT 2012 kill -USR1 15812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15812 killed at Mon Mar 26 17:49:19 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:19 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15868 >/dev/null 2>/dev/null selfserv_9793 with PID 15868 found at Mon Mar 26 17:49:19 EDT 2012 selfserv_9793 with PID 15868 started at Mon Mar 26 17:49:19 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3948: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 15868 at Mon Mar 26 17:49:20 EDT 2012 kill -USR1 15868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15868 killed at Mon Mar 26 17:49:20 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15936 >/dev/null 2>/dev/null selfserv_9793 with PID 15936 found at Mon Mar 26 17:49:20 EDT 2012 selfserv_9793 with PID 15936 started at Mon Mar 26 17:49:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3949: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15936 at Mon Mar 26 17:49:20 EDT 2012 kill -USR1 15936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15936 killed at Mon Mar 26 17:49:20 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15994 >/dev/null 2>/dev/null selfserv_9793 with PID 15994 found at Mon Mar 26 17:49:20 EDT 2012 selfserv_9793 with PID 15994 started at Mon Mar 26 17:49:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3950: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 15994 at Mon Mar 26 17:49:20 EDT 2012 kill -USR1 15994 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15994 killed at Mon Mar 26 17:49:20 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:20 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16050 >/dev/null 2>/dev/null selfserv_9793 with PID 16050 found at Mon Mar 26 17:49:20 EDT 2012 selfserv_9793 with PID 16050 started at Mon Mar 26 17:49:20 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3951: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16050 at Mon Mar 26 17:49:21 EDT 2012 kill -USR1 16050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16050 killed at Mon Mar 26 17:49:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16118 >/dev/null 2>/dev/null selfserv_9793 with PID 16118 found at Mon Mar 26 17:49:21 EDT 2012 selfserv_9793 with PID 16118 started at Mon Mar 26 17:49:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3952: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16118 at Mon Mar 26 17:49:21 EDT 2012 kill -USR1 16118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16118 killed at Mon Mar 26 17:49:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16174 >/dev/null 2>/dev/null selfserv_9793 with PID 16174 found at Mon Mar 26 17:49:21 EDT 2012 selfserv_9793 with PID 16174 started at Mon Mar 26 17:49:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3953: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16174 at Mon Mar 26 17:49:21 EDT 2012 kill -USR1 16174 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16174 killed at Mon Mar 26 17:49:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16230 >/dev/null 2>/dev/null selfserv_9793 with PID 16230 found at Mon Mar 26 17:49:21 EDT 2012 selfserv_9793 with PID 16230 started at Mon Mar 26 17:49:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3954: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16230 at Mon Mar 26 17:49:21 EDT 2012 kill -USR1 16230 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16230 killed at Mon Mar 26 17:49:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:21 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:21 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16298 >/dev/null 2>/dev/null selfserv_9793 with PID 16298 found at Mon Mar 26 17:49:22 EDT 2012 selfserv_9793 with PID 16298 started at Mon Mar 26 17:49:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3955: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16298 at Mon Mar 26 17:49:22 EDT 2012 kill -USR1 16298 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16298 killed at Mon Mar 26 17:49:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16354 >/dev/null 2>/dev/null selfserv_9793 with PID 16354 found at Mon Mar 26 17:49:22 EDT 2012 selfserv_9793 with PID 16354 started at Mon Mar 26 17:49:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3956: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16354 at Mon Mar 26 17:49:22 EDT 2012 kill -USR1 16354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16354 killed at Mon Mar 26 17:49:22 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16410 >/dev/null 2>/dev/null selfserv_9793 with PID 16410 found at Mon Mar 26 17:49:22 EDT 2012 selfserv_9793 with PID 16410 started at Mon Mar 26 17:49:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3957: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16410 at Mon Mar 26 17:49:22 EDT 2012 kill -USR1 16410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16410 killed at Mon Mar 26 17:49:22 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:22 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16478 >/dev/null 2>/dev/null selfserv_9793 with PID 16478 found at Mon Mar 26 17:49:22 EDT 2012 selfserv_9793 with PID 16478 started at Mon Mar 26 17:49:22 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3958: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16478 at Mon Mar 26 17:49:23 EDT 2012 kill -USR1 16478 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16478 killed at Mon Mar 26 17:49:23 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16534 >/dev/null 2>/dev/null selfserv_9793 with PID 16534 found at Mon Mar 26 17:49:23 EDT 2012 selfserv_9793 with PID 16534 started at Mon Mar 26 17:49:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3959: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16534 at Mon Mar 26 17:49:23 EDT 2012 kill -USR1 16534 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16534 killed at Mon Mar 26 17:49:23 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16590 >/dev/null 2>/dev/null selfserv_9793 with PID 16590 found at Mon Mar 26 17:49:23 EDT 2012 selfserv_9793 with PID 16590 started at Mon Mar 26 17:49:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3960: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16590 at Mon Mar 26 17:49:23 EDT 2012 kill -USR1 16590 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16590 killed at Mon Mar 26 17:49:23 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16658 >/dev/null 2>/dev/null selfserv_9793 with PID 16658 found at Mon Mar 26 17:49:23 EDT 2012 selfserv_9793 with PID 16658 started at Mon Mar 26 17:49:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3961: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16658 at Mon Mar 26 17:49:23 EDT 2012 kill -USR1 16658 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16658 killed at Mon Mar 26 17:49:23 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16714 >/dev/null 2>/dev/null selfserv_9793 with PID 16714 found at Mon Mar 26 17:49:23 EDT 2012 selfserv_9793 with PID 16714 started at Mon Mar 26 17:49:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3962: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16714 at Mon Mar 26 17:49:24 EDT 2012 kill -USR1 16714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16714 killed at Mon Mar 26 17:49:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:49:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16770 >/dev/null 2>/dev/null selfserv_9793 with PID 16770 found at Mon Mar 26 17:49:24 EDT 2012 selfserv_9793 with PID 16770 started at Mon Mar 26 17:49:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3963: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16770 at Mon Mar 26 17:49:24 EDT 2012 kill -USR1 16770 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16770 killed at Mon Mar 26 17:49:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16838 >/dev/null 2>/dev/null selfserv_9793 with PID 16838 found at Mon Mar 26 17:49:24 EDT 2012 selfserv_9793 with PID 16838 started at Mon Mar 26 17:49:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3964: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16838 at Mon Mar 26 17:49:24 EDT 2012 kill -USR1 16838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16838 killed at Mon Mar 26 17:49:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16894 >/dev/null 2>/dev/null selfserv_9793 with PID 16894 found at Mon Mar 26 17:49:24 EDT 2012 selfserv_9793 with PID 16894 started at Mon Mar 26 17:49:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3965: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 16894 at Mon Mar 26 17:49:24 EDT 2012 kill -USR1 16894 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16894 killed at Mon Mar 26 17:49:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:24 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:24 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16950 >/dev/null 2>/dev/null selfserv_9793 with PID 16950 found at Mon Mar 26 17:49:25 EDT 2012 selfserv_9793 with PID 16950 started at Mon Mar 26 17:49:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3966: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 16950 at Mon Mar 26 17:49:25 EDT 2012 kill -USR1 16950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16950 killed at Mon Mar 26 17:49:25 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9793 starting at Mon Mar 26 17:49:25 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:25 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:25 EDT 2012 selfserv_9793 with PID 17022 started at Mon Mar 26 17:49:25 EDT 2012 Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:25 EDT 2012 ssl.sh: #3967: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:25 EDT 2012 ssl.sh: #3968: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:25 EDT 2012 ssl.sh: #3969: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:25 EDT 2012 ssl.sh: #3970: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:25 EDT 2012 ssl.sh: #3971: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:26 EDT 2012 ssl.sh: #3972: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:26 EDT 2012 ssl.sh: #3973: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:26 EDT 2012 ssl.sh: #3974: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:26 EDT 2012 ssl.sh: #3975: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:26 EDT 2012 ssl.sh: #3976: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:26 EDT 2012 ssl.sh: #3977: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:26 EDT 2012 ssl.sh: #3978: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:26 EDT 2012 ssl.sh: #3979: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:27 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #3980: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: #3981: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: #3982: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: #3983: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: #3984: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: #3985: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: #3986: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: #3987: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: #3988: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:28 EDT 2012 ssl.sh: #3989: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:28 EDT 2012 ssl.sh: #3990: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:28 EDT 2012 ssl.sh: #3991: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:28 EDT 2012 ssl.sh: #3992: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:28 EDT 2012 ssl.sh: #3993: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:28 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #3994: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:28 EDT 2012 ssl.sh: #3995: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:28 EDT 2012 ssl.sh: #3996: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #3997: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #3998: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #3999: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #4000: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #4001: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #4002: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #4003: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #4004: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: #4005: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: #4006: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17022 >/dev/null 2>/dev/null selfserv_9793 with PID 17022 found at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: #4007: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 17022 at Mon Mar 26 17:49:30 EDT 2012 kill -USR1 17022 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17022 killed at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:30 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:30 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:30 EDT 2012 selfserv_9793 with PID 18442 started at Mon Mar 26 17:49:30 EDT 2012 Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: #4008: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: #4009: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: #4010: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: #4011: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: #4012: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: #4013: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: #4014: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: #4015: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: #4016: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: #4017: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: #4018: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: #4019: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:32 EDT 2012 ssl.sh: #4020: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:32 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4021: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:32 EDT 2012 ssl.sh: #4022: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:32 EDT 2012 ssl.sh: #4023: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:32 EDT 2012 ssl.sh: #4024: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:32 EDT 2012 ssl.sh: #4025: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:32 EDT 2012 ssl.sh: #4026: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:32 EDT 2012 ssl.sh: #4027: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:32 EDT 2012 ssl.sh: #4028: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:33 EDT 2012 ssl.sh: #4029: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:33 EDT 2012 ssl.sh: #4030: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:33 EDT 2012 ssl.sh: #4031: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:33 EDT 2012 ssl.sh: #4032: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:33 EDT 2012 ssl.sh: #4033: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:33 EDT 2012 ssl.sh: #4034: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:33 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4035: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:33 EDT 2012 ssl.sh: #4036: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:34 EDT 2012 ssl.sh: #4037: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:34 EDT 2012 ssl.sh: #4038: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:34 EDT 2012 ssl.sh: #4039: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:34 EDT 2012 ssl.sh: #4040: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:34 EDT 2012 ssl.sh: #4041: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:34 EDT 2012 ssl.sh: #4042: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:34 EDT 2012 ssl.sh: #4043: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:34 EDT 2012 ssl.sh: #4044: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:34 EDT 2012 ssl.sh: #4045: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:35 EDT 2012 ssl.sh: #4046: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:35 EDT 2012 ssl.sh: #4047: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18442 >/dev/null 2>/dev/null selfserv_9793 with PID 18442 found at Mon Mar 26 17:49:35 EDT 2012 ssl.sh: #4048: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 18442 at Mon Mar 26 17:49:35 EDT 2012 kill -USR1 18442 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18442 killed at Mon Mar 26 17:49:35 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:35 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19866 >/dev/null 2>/dev/null selfserv_9793 with PID 19866 found at Mon Mar 26 17:49:35 EDT 2012 selfserv_9793 with PID 19866 started at Mon Mar 26 17:49:35 EDT 2012 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 19866 at Mon Mar 26 17:49:35 EDT 2012 kill -USR1 19866 ./ssl.sh: line 207: 19866 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19866 killed at Mon Mar 26 17:49:35 EDT 2012 selfserv_9793 starting at Mon Mar 26 17:49:35 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:35 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:35 EDT 2012 selfserv_9793 with PID 19908 started at Mon Mar 26 17:49:35 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:35 EDT 2012 ssl.sh: #4049: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:35 EDT 2012 ssl.sh: #4050: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:35 EDT 2012 ssl.sh: #4051: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:36 EDT 2012 ssl.sh: #4052: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:36 EDT 2012 ssl.sh: #4053: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:36 EDT 2012 ssl.sh: #4054: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:36 EDT 2012 ssl.sh: #4055: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:36 EDT 2012 ssl.sh: #4056: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:36 EDT 2012 ssl.sh: #4057: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:36 EDT 2012 ssl.sh: #4058: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:37 EDT 2012 ssl.sh: #4059: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:37 EDT 2012 ssl.sh: #4060: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:37 EDT 2012 ssl.sh: #4061: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:37 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4062: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:37 EDT 2012 ssl.sh: #4063: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:37 EDT 2012 ssl.sh: #4064: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:37 EDT 2012 ssl.sh: #4065: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:37 EDT 2012 ssl.sh: #4066: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:38 EDT 2012 ssl.sh: #4067: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:38 EDT 2012 ssl.sh: #4068: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:38 EDT 2012 ssl.sh: #4069: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:38 EDT 2012 ssl.sh: #4070: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:38 EDT 2012 ssl.sh: #4071: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:38 EDT 2012 ssl.sh: #4072: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:38 EDT 2012 ssl.sh: #4073: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:38 EDT 2012 ssl.sh: #4074: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:39 EDT 2012 ssl.sh: #4075: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:39 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4076: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:39 EDT 2012 ssl.sh: #4077: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:39 EDT 2012 ssl.sh: #4078: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:39 EDT 2012 ssl.sh: #4079: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:39 EDT 2012 ssl.sh: #4080: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:39 EDT 2012 ssl.sh: #4081: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:39 EDT 2012 ssl.sh: #4082: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:40 EDT 2012 ssl.sh: #4083: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:40 EDT 2012 ssl.sh: #4084: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:40 EDT 2012 ssl.sh: #4085: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:40 EDT 2012 ssl.sh: #4086: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:40 EDT 2012 ssl.sh: #4087: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:40 EDT 2012 ssl.sh: #4088: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19908 >/dev/null 2>/dev/null selfserv_9793 with PID 19908 found at Mon Mar 26 17:49:40 EDT 2012 ssl.sh: #4089: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 19908 at Mon Mar 26 17:49:40 EDT 2012 kill -USR1 19908 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 19908 killed at Mon Mar 26 17:49:40 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:40 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:40 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:40 EDT 2012 selfserv_9793 with PID 21328 started at Mon Mar 26 17:49:40 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:41 EDT 2012 ssl.sh: #4090: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:41 EDT 2012 ssl.sh: #4091: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:41 EDT 2012 ssl.sh: #4092: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:41 EDT 2012 ssl.sh: #4093: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:41 EDT 2012 ssl.sh: #4094: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:41 EDT 2012 ssl.sh: #4095: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:41 EDT 2012 ssl.sh: #4096: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:41 EDT 2012 ssl.sh: #4097: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:42 EDT 2012 ssl.sh: #4098: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:42 EDT 2012 ssl.sh: #4099: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:42 EDT 2012 ssl.sh: #4100: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:42 EDT 2012 ssl.sh: #4101: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:42 EDT 2012 ssl.sh: #4102: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:42 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4103: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:42 EDT 2012 ssl.sh: #4104: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:42 EDT 2012 ssl.sh: #4105: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:43 EDT 2012 ssl.sh: #4106: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:43 EDT 2012 ssl.sh: #4107: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:43 EDT 2012 ssl.sh: #4108: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:43 EDT 2012 ssl.sh: #4109: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:43 EDT 2012 ssl.sh: #4110: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:43 EDT 2012 ssl.sh: #4111: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:43 EDT 2012 ssl.sh: #4112: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:43 EDT 2012 ssl.sh: #4113: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:44 EDT 2012 ssl.sh: #4114: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:44 EDT 2012 ssl.sh: #4115: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:44 EDT 2012 ssl.sh: #4116: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:44 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4117: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:44 EDT 2012 ssl.sh: #4118: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:44 EDT 2012 ssl.sh: #4119: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:44 EDT 2012 ssl.sh: #4120: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:44 EDT 2012 ssl.sh: #4121: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:45 EDT 2012 ssl.sh: #4122: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:45 EDT 2012 ssl.sh: #4123: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:45 EDT 2012 ssl.sh: #4124: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:45 EDT 2012 ssl.sh: #4125: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:45 EDT 2012 ssl.sh: #4126: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:45 EDT 2012 ssl.sh: #4127: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:45 EDT 2012 ssl.sh: #4128: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:45 EDT 2012 ssl.sh: #4129: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21328 >/dev/null 2>/dev/null selfserv_9793 with PID 21328 found at Mon Mar 26 17:49:46 EDT 2012 ssl.sh: #4130: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 21328 at Mon Mar 26 17:49:46 EDT 2012 kill -USR1 21328 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 21328 killed at Mon Mar 26 17:49:46 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22748 >/dev/null 2>/dev/null selfserv_9793 with PID 22748 found at Mon Mar 26 17:49:46 EDT 2012 selfserv_9793 with PID 22748 started at Mon Mar 26 17:49:46 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 22748 at Mon Mar 26 17:49:46 EDT 2012 kill -USR1 22748 ./ssl.sh: line 207: 22748 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22748 killed at Mon Mar 26 17:49:46 EDT 2012 selfserv_9793 starting at Mon Mar 26 17:49:46 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:46 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:46 EDT 2012 selfserv_9793 with PID 22790 started at Mon Mar 26 17:49:46 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:46 EDT 2012 ssl.sh: #4131: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:46 EDT 2012 ssl.sh: #4132: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:46 EDT 2012 ssl.sh: #4133: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:46 EDT 2012 ssl.sh: #4134: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:46 EDT 2012 ssl.sh: #4135: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:47 EDT 2012 ssl.sh: #4136: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:47 EDT 2012 ssl.sh: #4137: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:47 EDT 2012 ssl.sh: #4138: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:47 EDT 2012 ssl.sh: #4139: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:47 EDT 2012 ssl.sh: #4140: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:47 EDT 2012 ssl.sh: #4141: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:47 EDT 2012 ssl.sh: #4142: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:47 EDT 2012 ssl.sh: #4143: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:48 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4144: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:48 EDT 2012 ssl.sh: #4145: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:48 EDT 2012 ssl.sh: #4146: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:48 EDT 2012 ssl.sh: #4147: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:48 EDT 2012 ssl.sh: #4148: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:48 EDT 2012 ssl.sh: #4149: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:48 EDT 2012 ssl.sh: #4150: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:48 EDT 2012 ssl.sh: #4151: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:49 EDT 2012 ssl.sh: #4152: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:49 EDT 2012 ssl.sh: #4153: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:49 EDT 2012 ssl.sh: #4154: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:49 EDT 2012 ssl.sh: #4155: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:49 EDT 2012 ssl.sh: #4156: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:49 EDT 2012 ssl.sh: #4157: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:49 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4158: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:49 EDT 2012 ssl.sh: #4159: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:50 EDT 2012 ssl.sh: #4160: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:50 EDT 2012 ssl.sh: #4161: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:50 EDT 2012 ssl.sh: #4162: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:50 EDT 2012 ssl.sh: #4163: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:50 EDT 2012 ssl.sh: #4164: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:50 EDT 2012 ssl.sh: #4165: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:50 EDT 2012 ssl.sh: #4166: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:50 EDT 2012 ssl.sh: #4167: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:51 EDT 2012 ssl.sh: #4168: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:51 EDT 2012 ssl.sh: #4169: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:51 EDT 2012 ssl.sh: #4170: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22790 >/dev/null 2>/dev/null selfserv_9793 with PID 22790 found at Mon Mar 26 17:49:51 EDT 2012 ssl.sh: #4171: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 22790 at Mon Mar 26 17:49:51 EDT 2012 kill -USR1 22790 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 22790 killed at Mon Mar 26 17:49:51 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:51 EDT 2012 selfserv_9793 with PID 24213 started at Mon Mar 26 17:49:51 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:51 EDT 2012 ssl.sh: #4172: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:51 EDT 2012 ssl.sh: #4173: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:51 EDT 2012 ssl.sh: #4174: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:52 EDT 2012 ssl.sh: #4175: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:52 EDT 2012 ssl.sh: #4176: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:52 EDT 2012 ssl.sh: #4177: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:52 EDT 2012 ssl.sh: #4178: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:52 EDT 2012 ssl.sh: #4179: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:52 EDT 2012 ssl.sh: #4180: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:52 EDT 2012 ssl.sh: #4181: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:53 EDT 2012 ssl.sh: #4182: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:53 EDT 2012 ssl.sh: #4183: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:53 EDT 2012 ssl.sh: #4184: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:53 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4185: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:53 EDT 2012 ssl.sh: #4186: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:53 EDT 2012 ssl.sh: #4187: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:53 EDT 2012 ssl.sh: #4188: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:53 EDT 2012 ssl.sh: #4189: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:54 EDT 2012 ssl.sh: #4190: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:54 EDT 2012 ssl.sh: #4191: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:54 EDT 2012 ssl.sh: #4192: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:54 EDT 2012 ssl.sh: #4193: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:54 EDT 2012 ssl.sh: #4194: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:54 EDT 2012 ssl.sh: #4195: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:54 EDT 2012 ssl.sh: #4196: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:54 EDT 2012 ssl.sh: #4197: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:55 EDT 2012 ssl.sh: #4198: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:55 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4199: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:55 EDT 2012 ssl.sh: #4200: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:55 EDT 2012 ssl.sh: #4201: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:55 EDT 2012 ssl.sh: #4202: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:55 EDT 2012 ssl.sh: #4203: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:55 EDT 2012 ssl.sh: #4204: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:55 EDT 2012 ssl.sh: #4205: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:55 EDT 2012 ssl.sh: #4206: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:56 EDT 2012 ssl.sh: #4207: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:56 EDT 2012 ssl.sh: #4208: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:56 EDT 2012 ssl.sh: #4209: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:56 EDT 2012 ssl.sh: #4210: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:56 EDT 2012 ssl.sh: #4211: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24213 >/dev/null 2>/dev/null selfserv_9793 with PID 24213 found at Mon Mar 26 17:49:56 EDT 2012 ssl.sh: #4212: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 24213 at Mon Mar 26 17:49:56 EDT 2012 kill -USR1 24213 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 24213 killed at Mon Mar 26 17:49:56 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:49:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25633 >/dev/null 2>/dev/null selfserv_9793 with PID 25633 found at Mon Mar 26 17:49:56 EDT 2012 selfserv_9793 with PID 25633 started at Mon Mar 26 17:49:56 EDT 2012 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 25633 at Mon Mar 26 17:49:56 EDT 2012 kill -USR1 25633 ./ssl.sh: line 207: 25633 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25633 killed at Mon Mar 26 17:49:56 EDT 2012 ssl.sh: SSL Stress Test - server bypass/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:49:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 25984 >/dev/null 2>/dev/null selfserv_9793 with PID 25984 found at Mon Mar 26 17:49:57 EDT 2012 selfserv_9793 with PID 25984 started at Mon Mar 26 17:49:57 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:49:57 EDT 2012 ssl.sh: #4213: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 25984 at Mon Mar 26 17:49:57 EDT 2012 kill -USR1 25984 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 25984 killed at Mon Mar 26 17:49:57 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:49:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26060 >/dev/null 2>/dev/null selfserv_9793 with PID 26060 found at Mon Mar 26 17:49:57 EDT 2012 selfserv_9793 with PID 26060 started at Mon Mar 26 17:49:58 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:58 EDT 2012 ssl.sh: #4214: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26060 at Mon Mar 26 17:49:58 EDT 2012 kill -USR1 26060 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26060 killed at Mon Mar 26 17:49:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:49:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26136 >/dev/null 2>/dev/null selfserv_9793 with PID 26136 found at Mon Mar 26 17:49:58 EDT 2012 selfserv_9793 with PID 26136 started at Mon Mar 26 17:49:58 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:59 EDT 2012 ssl.sh: #4215: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26136 at Mon Mar 26 17:49:59 EDT 2012 kill -USR1 26136 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26136 killed at Mon Mar 26 17:49:59 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:49:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26212 >/dev/null 2>/dev/null selfserv_9793 with PID 26212 found at Mon Mar 26 17:49:59 EDT 2012 selfserv_9793 with PID 26212 started at Mon Mar 26 17:49:59 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:59 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:59 EDT 2012 ssl.sh: #4216: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26212 at Mon Mar 26 17:49:59 EDT 2012 kill -USR1 26212 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26212 killed at Mon Mar 26 17:49:59 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:49:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:49:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26288 >/dev/null 2>/dev/null selfserv_9793 with PID 26288 found at Mon Mar 26 17:49:59 EDT 2012 selfserv_9793 with PID 26288 started at Mon Mar 26 17:49:59 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:59 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:50:00 EDT 2012 ssl.sh: #4217: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26288 at Mon Mar 26 17:50:00 EDT 2012 kill -USR1 26288 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26288 killed at Mon Mar 26 17:50:00 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:50:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26364 >/dev/null 2>/dev/null selfserv_9793 with PID 26364 found at Mon Mar 26 17:50:00 EDT 2012 selfserv_9793 with PID 26364 started at Mon Mar 26 17:50:00 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:00 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:50:00 EDT 2012 ssl.sh: #4218: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26364 at Mon Mar 26 17:50:00 EDT 2012 kill -USR1 26364 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26364 killed at Mon Mar 26 17:50:00 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:50:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26440 >/dev/null 2>/dev/null selfserv_9793 with PID 26440 found at Mon Mar 26 17:50:01 EDT 2012 selfserv_9793 with PID 26440 started at Mon Mar 26 17:50:01 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:01 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:50:01 EDT 2012 ssl.sh: #4219: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26440 at Mon Mar 26 17:50:01 EDT 2012 kill -USR1 26440 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26440 killed at Mon Mar 26 17:50:01 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:50:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26519 >/dev/null 2>/dev/null selfserv_9793 with PID 26519 found at Mon Mar 26 17:50:01 EDT 2012 selfserv_9793 with PID 26519 started at Mon Mar 26 17:50:01 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:01 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:50:02 EDT 2012 ssl.sh: #4220: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26519 at Mon Mar 26 17:50:02 EDT 2012 kill -USR1 26519 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26519 killed at Mon Mar 26 17:50:02 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9793 starting at Mon Mar 26 17:50:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26601 >/dev/null 2>/dev/null selfserv_9793 with PID 26601 found at Mon Mar 26 17:50:02 EDT 2012 selfserv_9793 with PID 26601 started at Mon Mar 26 17:50:02 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:02 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:50:03 EDT 2012 ssl.sh: #4221: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26601 at Mon Mar 26 17:50:03 EDT 2012 kill -USR1 26601 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26601 killed at Mon Mar 26 17:50:03 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26698 >/dev/null 2>/dev/null selfserv_9793 with PID 26698 found at Mon Mar 26 17:50:03 EDT 2012 selfserv_9793 with PID 26698 started at Mon Mar 26 17:50:03 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:03 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:50:04 EDT 2012 ssl.sh: #4222: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26698 at Mon Mar 26 17:50:04 EDT 2012 kill -USR1 26698 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26698 killed at Mon Mar 26 17:50:04 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26773 >/dev/null 2>/dev/null selfserv_9793 with PID 26773 found at Mon Mar 26 17:50:04 EDT 2012 selfserv_9793 with PID 26773 started at Mon Mar 26 17:50:04 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:04 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:50:04 EDT 2012 ssl.sh: #4223: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26773 at Mon Mar 26 17:50:05 EDT 2012 kill -USR1 26773 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26773 killed at Mon Mar 26 17:50:05 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26848 >/dev/null 2>/dev/null selfserv_9793 with PID 26848 found at Mon Mar 26 17:50:05 EDT 2012 selfserv_9793 with PID 26848 started at Mon Mar 26 17:50:05 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:05 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:50:05 EDT 2012 ssl.sh: #4224: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26848 at Mon Mar 26 17:50:05 EDT 2012 kill -USR1 26848 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26848 killed at Mon Mar 26 17:50:05 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26923 >/dev/null 2>/dev/null selfserv_9793 with PID 26923 found at Mon Mar 26 17:50:05 EDT 2012 selfserv_9793 with PID 26923 started at Mon Mar 26 17:50:05 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:05 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:50:06 EDT 2012 ssl.sh: #4225: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26923 at Mon Mar 26 17:50:06 EDT 2012 kill -USR1 26923 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26923 killed at Mon Mar 26 17:50:06 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 26999 >/dev/null 2>/dev/null selfserv_9793 with PID 26999 found at Mon Mar 26 17:50:06 EDT 2012 selfserv_9793 with PID 26999 started at Mon Mar 26 17:50:06 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:06 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:50:06 EDT 2012 ssl.sh: #4226: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 26999 at Mon Mar 26 17:50:06 EDT 2012 kill -USR1 26999 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 26999 killed at Mon Mar 26 17:50:06 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:50:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27075 >/dev/null 2>/dev/null selfserv_9793 with PID 27075 found at Mon Mar 26 17:50:06 EDT 2012 selfserv_9793 with PID 27075 started at Mon Mar 26 17:50:06 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:06 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:50:06 EDT 2012 ssl.sh: #4227: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27075 at Mon Mar 26 17:50:06 EDT 2012 kill -USR1 27075 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27075 killed at Mon Mar 26 17:50:06 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27151 >/dev/null 2>/dev/null selfserv_9793 with PID 27151 found at Mon Mar 26 17:50:06 EDT 2012 selfserv_9793 with PID 27151 started at Mon Mar 26 17:50:06 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:06 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:50:07 EDT 2012 ssl.sh: #4228: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27151 at Mon Mar 26 17:50:07 EDT 2012 kill -USR1 27151 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27151 killed at Mon Mar 26 17:50:07 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:50:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27227 >/dev/null 2>/dev/null selfserv_9793 with PID 27227 found at Mon Mar 26 17:50:07 EDT 2012 selfserv_9793 with PID 27227 started at Mon Mar 26 17:50:07 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:50:07 EDT 2012 ssl.sh: #4229: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27227 at Mon Mar 26 17:50:07 EDT 2012 kill -USR1 27227 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27227 killed at Mon Mar 26 17:50:07 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9793 starting at Mon Mar 26 17:50:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27309 >/dev/null 2>/dev/null selfserv_9793 with PID 27309 found at Mon Mar 26 17:50:07 EDT 2012 selfserv_9793 with PID 27309 started at Mon Mar 26 17:50:07 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:50:08 EDT 2012 ssl.sh: #4230: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27309 at Mon Mar 26 17:50:08 EDT 2012 kill -USR1 27309 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27309 killed at Mon Mar 26 17:50:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9793 starting at Mon Mar 26 17:50:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27391 >/dev/null 2>/dev/null selfserv_9793 with PID 27391 found at Mon Mar 26 17:50:08 EDT 2012 selfserv_9793 with PID 27391 started at Mon Mar 26 17:50:08 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:50:08 EDT 2012 ssl.sh: #4231: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27391 at Mon Mar 26 17:50:08 EDT 2012 kill -USR1 27391 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27391 killed at Mon Mar 26 17:50:08 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:50:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27848 >/dev/null 2>/dev/null selfserv_9793 with PID 27848 found at Mon Mar 26 17:50:09 EDT 2012 selfserv_9793 with PID 27848 started at Mon Mar 26 17:50:09 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:50:09 EDT 2012 ssl.sh: #4232: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27848 at Mon Mar 26 17:50:09 EDT 2012 kill -USR1 27848 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27848 killed at Mon Mar 26 17:50:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:50:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 27924 >/dev/null 2>/dev/null selfserv_9793 with PID 27924 found at Mon Mar 26 17:50:10 EDT 2012 selfserv_9793 with PID 27924 started at Mon Mar 26 17:50:10 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:50:10 EDT 2012 ssl.sh: #4233: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 27924 at Mon Mar 26 17:50:10 EDT 2012 kill -USR1 27924 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 27924 killed at Mon Mar 26 17:50:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:50:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28000 >/dev/null 2>/dev/null selfserv_9793 with PID 28000 found at Mon Mar 26 17:50:10 EDT 2012 selfserv_9793 with PID 28000 started at Mon Mar 26 17:50:10 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:50:11 EDT 2012 ssl.sh: #4234: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28000 at Mon Mar 26 17:50:11 EDT 2012 kill -USR1 28000 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28000 killed at Mon Mar 26 17:50:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:50:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28076 >/dev/null 2>/dev/null selfserv_9793 with PID 28076 found at Mon Mar 26 17:50:11 EDT 2012 selfserv_9793 with PID 28076 started at Mon Mar 26 17:50:11 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:50:11 EDT 2012 ssl.sh: #4235: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28076 at Mon Mar 26 17:50:11 EDT 2012 kill -USR1 28076 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28076 killed at Mon Mar 26 17:50:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:50:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28152 >/dev/null 2>/dev/null selfserv_9793 with PID 28152 found at Mon Mar 26 17:50:11 EDT 2012 selfserv_9793 with PID 28152 started at Mon Mar 26 17:50:11 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:50:12 EDT 2012 ssl.sh: #4236: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28152 at Mon Mar 26 17:50:12 EDT 2012 kill -USR1 28152 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28152 killed at Mon Mar 26 17:50:12 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:50:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28228 >/dev/null 2>/dev/null selfserv_9793 with PID 28228 found at Mon Mar 26 17:50:12 EDT 2012 selfserv_9793 with PID 28228 started at Mon Mar 26 17:50:12 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:50:13 EDT 2012 ssl.sh: #4237: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28228 at Mon Mar 26 17:50:13 EDT 2012 kill -USR1 28228 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28228 killed at Mon Mar 26 17:50:13 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:50:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28304 >/dev/null 2>/dev/null selfserv_9793 with PID 28304 found at Mon Mar 26 17:50:13 EDT 2012 selfserv_9793 with PID 28304 started at Mon Mar 26 17:50:13 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:50:14 EDT 2012 ssl.sh: #4238: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28304 at Mon Mar 26 17:50:14 EDT 2012 kill -USR1 28304 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28304 killed at Mon Mar 26 17:50:14 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28409 >/dev/null 2>/dev/null selfserv_9793 with PID 28409 found at Mon Mar 26 17:50:14 EDT 2012 selfserv_9793 with PID 28409 started at Mon Mar 26 17:50:14 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:50:15 EDT 2012 ssl.sh: #4239: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28409 at Mon Mar 26 17:50:15 EDT 2012 kill -USR1 28409 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28409 killed at Mon Mar 26 17:50:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28484 >/dev/null 2>/dev/null selfserv_9793 with PID 28484 found at Mon Mar 26 17:50:15 EDT 2012 selfserv_9793 with PID 28484 started at Mon Mar 26 17:50:15 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:50:16 EDT 2012 ssl.sh: #4240: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28484 at Mon Mar 26 17:50:16 EDT 2012 kill -USR1 28484 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28484 killed at Mon Mar 26 17:50:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28560 >/dev/null 2>/dev/null selfserv_9793 with PID 28560 found at Mon Mar 26 17:50:16 EDT 2012 selfserv_9793 with PID 28560 started at Mon Mar 26 17:50:16 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:50:17 EDT 2012 ssl.sh: #4241: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28560 at Mon Mar 26 17:50:17 EDT 2012 kill -USR1 28560 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28560 killed at Mon Mar 26 17:50:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28636 >/dev/null 2>/dev/null selfserv_9793 with PID 28636 found at Mon Mar 26 17:50:17 EDT 2012 selfserv_9793 with PID 28636 started at Mon Mar 26 17:50:17 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:50:17 EDT 2012 ssl.sh: #4242: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28636 at Mon Mar 26 17:50:17 EDT 2012 kill -USR1 28636 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28636 killed at Mon Mar 26 17:50:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:50:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28712 >/dev/null 2>/dev/null selfserv_9793 with PID 28712 found at Mon Mar 26 17:50:17 EDT 2012 selfserv_9793 with PID 28712 started at Mon Mar 26 17:50:17 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:50:17 EDT 2012 ssl.sh: #4243: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28712 at Mon Mar 26 17:50:17 EDT 2012 kill -USR1 28712 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28712 killed at Mon Mar 26 17:50:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:50:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28788 >/dev/null 2>/dev/null selfserv_9793 with PID 28788 found at Mon Mar 26 17:50:18 EDT 2012 selfserv_9793 with PID 28788 started at Mon Mar 26 17:50:18 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:18 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:50:18 EDT 2012 ssl.sh: #4244: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28788 at Mon Mar 26 17:50:18 EDT 2012 kill -USR1 28788 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28788 killed at Mon Mar 26 17:50:18 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:50:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:50:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 28864 >/dev/null 2>/dev/null selfserv_9793 with PID 28864 found at Mon Mar 26 17:50:18 EDT 2012 selfserv_9793 with PID 28864 started at Mon Mar 26 17:50:18 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:50:18 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:50:18 EDT 2012 ssl.sh: #4245: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 28864 at Mon Mar 26 17:50:18 EDT 2012 kill -USR1 28864 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 28864 killed at Mon Mar 26 17:50:18 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) TIMESTAMP ssl END: Mon Mar 26 17:50:19 EDT 2012 Running tests for merge TIMESTAMP merge BEGIN: Mon Mar 26 17:50:19 EDT 2012 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/tests.v3.18664 -t Test2 -f ../tests.pw merge.sh: #4246: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4247: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4248: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4249: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4250: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4251: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:26 2012 Not After : Sun Mar 26 21:41:26 2017 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:8c:37:6f:a0:dc:a3:c5:72:b4:fd:ff:95:01:a3:fe: e3:6e:8b:d5:6f:d6:c6:fe:f7:3f:e0:3e:74:8b:b1:53: 1e:26:80:ab:c7:7d:77:52:04:ac:e5:72:59:a2:a9:11: e5:53:dc:6b:46:e6:60:cb:52:d2:b1:f2:85:f2:76:96: 7b:d1:47:ad:50:4b:8e:2b:18:8c:d7:71:83:2f:35:a4: 2f:a0:3f:ae:e1:f9:2b:a7:de:3f:e1:e8:06:08:f0:1d: 2b:8d:70:f5:38:1e:ef:6f:7f:fd:f0:80:09:28:66:c1: 72:df:6d:93:26:90:35:ed:85:ac:ef:b4:a8:17:c0:99 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6a:5d:5c:4c:cc:a6:6d:24:6b:b1:4b:38:88:57:9e:07: d1:72:6e:f2:97:66:66:83:f8:85:c8:66:aa:62:26:da: 80:ff:8d:30:c4:40:73:9f:73:47:2b:9f:07:c9:96:d0: 2b:d9:7a:e0:07:da:56:e5:02:27:d2:1f:d6:0c:16:7b: a0:62:76:76:71:6e:e6:bb:ad:55:9b:1a:f8:95:6a:97: 8c:b1:79:ba:9d:d2:8d:66:0d:70:5b:0c:5a:22:70:4d: 8d:89:61:45:b4:ba:35:4d:39:8f:16:20:cf:64:62:fa: d6:4c:6b:f4:bd:ca:f1:57:7b:77:8e:e4:92:f5:bf:60 Fingerprint (MD5): 05:2A:3D:41:41:87:01:D4:C8:94:AD:DA:A2:91:6A:2F Fingerprint (SHA1): 82:C7:44:00:39:55:97:25:4E:67:83:66:E9:60:23:22:F0:67:A9:C2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4252: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:41:26 2012 Not After : Sun Mar 26 21:41:26 2017 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:4e:cf:0a:3d:13:8e:03:cc:8d:9d:a3:38:76:42:0e: fd:70:4b:16:c9:4a:51:3f:98:9d:c7:07:29:47:5a:f7: b9:bb:42:22:a9:c1:9e:dd:8f:69:bf:1e:0d:72:36:b6: 4b:40:6b:35:84:42:4f:e9:54:f6:f2:e8:61:78:b9:b3: a4:d8:bb:bd:e6:45:42:2d:88:ba:92:a2:0b:6d:c2:14: a7:84:77:c5:1f:97:1b:4a:32:7e:c3:11:cc:1d:26:a5: a3:58:5d:53:65:b2:36:c3:88:56:08:b7:e2:42:2a:d8: dd:84:fd:9d:64:29:93:7d:c9:40:99:56:f6:55:50:e5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:7d:7a:03:0d:1d:fa:6c:c8:37:7c:78:5d:e2:cb:f8: cf:41:71:f5:ea:70:27:60:52:f6:7e:44:ee:2f:fc:46: 0c:97:bc:68:54:6f:43:4e:26:69:7f:67:5d:ea:4b:c8: 2a:09:73:2f:03:ee:62:69:ec:03:6f:77:93:d5:f2:5e: 2a:14:2c:d7:10:6d:0c:00:b0:6f:9a:ec:3f:74:7e:e0: 3e:b8:17:f3:b0:68:a4:c6:cb:50:ba:1a:06:54:8c:67: 17:34:79:65:bd:2e:13:da:28:a7:fc:83:29:a3:9e:22: 47:4d:a4:f3:6f:ba:53:33:e7:af:b0:09:9d:71:09:62 Fingerprint (MD5): 9A:BB:7D:E9:0E:D2:98:51:28:DA:46:D9:4D:F0:4B:BB Fingerprint (SHA1): D9:9B:D8:B9:BA:C9:3D:5E:5E:90:1B:A3:95:A0:6D:B5:AB:AB:87:28 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4253: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4254: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Alice u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, TestCA CT,C,C localhost.localdomain u,u,u localhost-sni.localdomain u,u,u clientCA T,C,C chain-2-clientCA ,, ExtendedSSLUser u,u,u serverCA C,C,C chain-1-clientCA ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/tests.v3.18664 -t Test2 -f ../tests.pw merge.sh: #4255: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/tests.v1.18664 -t Test1 -f ../tests.pw merge.sh: #4256: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #4257: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #4258: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #4259: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Mar 26 21:41:32 2012 Entry (1): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:41:17 2012 Entry Extensions: Name: CRL reason code Entry (2): Serial Number: 42 (0x2a) Revocation Date: Mon Mar 26 21:41:30 2012 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #4260: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Mon Mar 26 17:50:22 EDT 2012 merge.sh: Testing with shared library =============================== Running tests for cert TIMESTAMP cert BEGIN: Mon Mar 26 17:50:22 EDT 2012 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #4261: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #4262: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4263: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4264: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #4265: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #4266: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4267: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4268: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #4269: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4270: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #4271: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4272: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #4273: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #4274: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4275: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4276: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #4277: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4278: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #4279: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4280: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #4281: Exporting Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #4282: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4283: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4284: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #4285: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #4286: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #4287: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert cert.sh: #4288: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert cert.sh: #4289: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #4290: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #4291: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4292: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4293: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #4294: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert cert.sh: #4295: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #4296: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #4297: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert cert.sh: #4298: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert cert.sh: #4299: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #4300: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4301: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #4302: Import Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4303: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #4304: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert cert.sh: #4305: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #4306: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4307: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #4308: Import Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4309: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #4310: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #4311: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4312: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #4313: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert cert.sh: #4314: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #4315: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #4316: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4317: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #4318: Import Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4319: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #4320: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert cert.sh: #4321: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #4322: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4323: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #4324: Import Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4325: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #4326: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert cert.sh: #4327: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #4328: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4329: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #4330: Import Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4331: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #4332: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert cert.sh: #4333: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #4334: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4335: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #4336: Import Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4337: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #4338: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert cert.sh: #4339: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #4340: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #4341: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #4342: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #4343: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #4344: Import Eve's cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #4345: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4346: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #4347: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... cert.sh: #4348: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #4349: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4350: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #4351: Import Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4352: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #4353: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert cert.sh: #4354: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:b8 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:45 2012 Not After : Tue Jun 26 21:50:45 2012 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:a6:e3:01:40:10:4d:52:cb:58:90:ea:9a:28:d1:9d: e4:85:b3:2f:cc:55:ab:5d:dc:40:e0:24:6c:d8:64:3d: 5a:90:6e:9c:4d:d8:ef:59:d2:4e:15:d9:b9:bc:ff:42: 0d:17:37:c6:d2:12:0e:e8:53:a4:e1:18:7a:40:f5:ad: 9e:f9:25:aa:46:72:36:85:36:6f:f1:23:94:5f:89:33: 3a:d2:cd:08:ab:66:16:31:bd:2e:e5:95:a0:5c:81:ba: f2:88:5b:81:90:e2:57:34:b0:db:5b:ac:74:6f:38:54: 64:5a:c3:78:c4:74:bc:b7:77:33:cf:40:33:36:8f:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:e6:bd:9d:8a:a8:01:b4:a5:d0:b7:9d:33:8d:36:9d: 22:af:30:e5:82:40:f7:cd:6b:41:42:24:5a:b1:43:93: c5:4d:38:06:09:8d:7b:e3:5e:4a:27:0c:80:1d:ea:35: a7:05:f2:65:11:55:f9:a9:e3:4f:6b:79:bd:61:93:1c: 71:e7:aa:95:ef:2e:d9:f3:a6:ab:c8:9c:ec:96:03:47: 18:71:a5:42:17:4c:4a:23:b6:ff:d3:1e:bc:52:95:8b: c1:c2:de:af:f8:8a:ed:04:18:d7:47:30:64:fa:d9:eb: 62:b8:f6:51:47:ea:cf:d3:ea:d7:47:24:5b:ec:73:e5 Fingerprint (MD5): B2:A1:6D:23:F0:BD:08:F8:39:3B:66:CA:D7:12:8C:17 Fingerprint (SHA1): E5:4D:36:EE:14:53:AA:27:49:47:46:05:32:9B:E8:A8:31:A4:A6:DA Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4355: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:ba Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:45 2012 Not After : Tue Jun 26 21:50:45 2012 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:eb:62:22:8c:ce:aa:c1:a3:73:62:9a:a8:8c:fe:68: a7:2a:7d:88:c9:9f:c9:72:19:0b:d3:88:f0:54:a3:c1: d8:1e:30:46:b8:d2:13:b5:06:be:45:0e:f3:6c:06:85: 5a:b3:dd:ce:68:1e:a9:82:3d:53:30:50:4a:e0:c4:67: 3e:f8:e2:4e:d3:31:1a:7f:40:0f:d2:d9:b6:a0:f1:76: f0:4f:f1:6c:1e:0c:1b:0f:67:6a:18:f9:a9:fc:5d:6f: 38:48:29:7b:02:e3:67:c3:9c:2b:fd:2a:67:2a:92:95: 1f:b9:9a:78:2e:37:f3:3a:2a:f1:d3:e0:b8:e3:98:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 64:e7:43:26:61:ac:5f:c7:25:7a:b0:f9:15:12:8c:9a: 07:ef:57:cb:5c:67:b9:b8:00:72:dd:16:52:77:c3:7c: 34:25:2a:cf:04:80:f5:23:eb:55:b3:0c:43:b9:74:cc: cf:9f:42:d9:83:f1:1c:46:40:65:0e:0d:eb:1d:a0:0d: 46:e2:ac:dd:16:99:6b:96:31:0a:4e:1e:db:bc:d7:9f: 2d:89:84:0f:7d:e4:65:f5:0a:1c:56:71:58:b1:c4:b5: 74:f6:76:aa:79:13:30:d9:61:9b:02:86:b2:d1:d9:1b: 88:3c:ff:8d:53:88:0c:26:b4:19:01:7c:17:f2:e9:e0 Fingerprint (MD5): AB:D1:1B:1A:98:53:2C:89:DA:58:1B:55:86:9A:ED:7F Fingerprint (SHA1): B4:23:94:E4:88:B9:3B:E0:31:76:18:61:06:84:41:79:19:44:CD:B2 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4356: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:bb Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:46 2012 Not After : Tue Jun 26 21:50:46 2012 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:dc:77:d0:2f:51:e2:4e:0d:7c:6a:64:8e:2d:75:b9: 8b:f0:ab:42:c8:3d:31:d0:1e:0d:95:7a:1e:4b:5d:3e: 61:9f:bd:9e:c8:63:41:93:bc:1c:ad:6e:f5:e1:80:32: d3:97:df:d0:a6:81:44:e5:65:1d:42:93:8c:97:a5:6c: f5:0e:9b:33:0b:f3:a8:80:42:57:35:05:5d:c0:8e:58: 82:b7:7f:9a:b3:27:46:90:9b:3a:58:c5:37:da:f2:b6: 49:ab:24:57:38:1e:65:3a:73:90:4b:63:56:a0:82:c0: 50:0d:e8:c9:c3:67:ff:b5:46:15:24:cc:a2:dc:54:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 74:15:d8:33:60:40:03:c9:62:28:63:d2:60:99:0d:99: dc:69:b3:10:01:d5:b1:e2:2d:ef:52:e8:ff:2b:71:df: 38:25:2a:2f:dd:9e:6a:e1:0d:9c:74:db:75:b9:1c:c1: da:94:a4:f0:fc:55:47:f5:5b:0d:3c:86:30:c9:24:c5: c2:0d:ab:42:29:e2:bb:7d:9f:1a:73:8d:47:f0:7e:86: 42:a7:fb:9b:9a:f9:99:dd:da:0b:39:1d:26:e3:da:b5: ff:fb:c0:ae:11:c7:af:e5:f4:ac:9e:be:a5:5f:04:77: 15:14:88:a2:75:1f:e2:66:75:a0:cc:0e:05:8c:e9:97 Fingerprint (MD5): 82:F7:7A:4E:B8:3F:24:74:90:6F:BF:9A:2D:90:28:BC Fingerprint (SHA1): E5:D1:5A:13:D3:EB:2E:01:44:A6:A9:B5:2B:FD:DF:34:D3:65:B0:3D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4357: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:bc Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:47 2012 Not After : Tue Jun 26 21:50:47 2012 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:30:13:bb:33:e5:41:07:7d:d7:ec:af:31:33:bc:4b: 09:98:d1:48:7c:fc:35:07:51:2b:eb:01:ee:8c:ad:b5: fb:04:87:a9:6b:dc:7a:6f:a5:76:82:e5:29:d1:b2:9f: 87:a9:fa:20:1b:d8:81:71:3c:9d:66:d0:41:fc:97:aa: dc:a2:6d:59:e4:31:f8:23:22:05:d4:e5:5c:3c:30:22: c8:10:87:18:41:5e:bb:3d:c1:39:f0:fb:f8:1c:2c:47: b0:fa:c3:d0:80:38:fd:71:d5:0c:52:bb:e8:0d:00:72: 0b:50:62:89:cd:a4:e8:9a:08:7a:5d:f9:61:1d:13:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 06:15:be:86:61:a8:cc:4c:c5:cc:44:a3:ef:a3:c2:de: 33:34:1c:f1:72:52:b2:6b:1d:a2:0a:2d:82:61:97:d8: b6:6e:19:0c:37:91:4e:3c:17:e4:b7:b7:dc:4a:4e:49: 64:37:15:fd:63:5e:eb:15:92:9f:ca:ec:a2:45:88:3d: 8a:db:aa:69:42:1c:36:88:43:22:df:3c:24:70:68:b4: 66:40:43:ae:70:e1:bf:03:8c:d6:41:45:79:51:02:95: 17:b2:8d:3c:c7:2e:73:df:73:51:b7:7e:bf:f1:56:f7: 44:5c:23:78:94:be:81:c3:65:7d:b8:40:59:3a:01:4d Fingerprint (MD5): EA:57:EA:95:A0:CE:CC:48:6F:04:6E:69:0E:FA:98:EF Fingerprint (SHA1): EF:37:D2:91:97:02:49:6C:9C:2C:2D:D0:79:98:BF:C7:66:CD:61:F3 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4358: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:be Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:48 2012 Not After : Tue Jun 26 21:50:48 2012 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:4e:a4:21:ef:a2:79:ba:0d:01:94:3e:03:ed:a7:20: 71:fe:66:18:f7:2a:30:82:3f:98:08:60:8d:43:35:24: 4a:a4:f6:2b:3e:a9:32:db:75:1c:b6:b1:4c:de:24:82: 8c:cc:bb:17:4c:c7:6c:fe:fb:eb:94:60:e5:13:f6:69: e7:9a:96:6e:85:53:d1:7a:0d:4e:0a:0c:68:52:d0:3a: cd:52:35:08:1d:e9:c3:83:25:5c:cf:29:a5:71:f5:f0: cf:aa:51:73:eb:58:b5:8e:0b:af:5c:13:c1:14:db:28: 51:e6:4e:9b:58:0f:1e:a4:41:53:39:15:d8:0b:45:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: e5:27:5f:64:78:42:7f:fa:2d:ca:15:7f:00:fa:8f:d3: 3e:c3:db:fa:15:b3:cd:e4:6a:08:d9:2a:9b:c1:14:54: 6b:e2:d8:74:f1:27:8b:97:a4:00:a7:67:1a:fc:a4:c2: 95:dd:1e:09:ff:94:c5:2e:95:9e:28:48:b5:67:2b:35: 97:ce:84:8e:40:8f:62:38:d6:6e:b6:65:d9:e2:68:0b: 81:74:8a:3a:34:c5:ea:75:e7:31:09:22:25:22:d3:04: f1:a2:9a:38:c7:45:f6:ef:e5:8d:4d:a9:92:aa:3e:0e: b3:47:d4:94:b1:7c:af:68:22:fe:e9:96:67:9e:56:58 Fingerprint (MD5): D9:55:F6:5A:D1:B1:04:EC:B8:7D:72:23:D5:41:72:B0 Fingerprint (SHA1): BE:39:6F:09:0B:3C:66:A4:17:45:09:0B:9B:C4:E1:39:5F:92:47:62 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4359: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:48 2012 Not After : Tue Jun 26 21:50:48 2012 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e2:9b:7b:e5:59:6a:03:39:77:9a:b5:f4:8c:25:a7: ac:86:c0:cc:24:bb:71:2f:80:b9:e4:0c:57:4c:11:77: 4a:e5:87:f7:00:4a:c0:f6:10:05:e8:1b:c1:cd:62:0c: 4a:2b:c8:0f:ec:ac:80:1d:ac:61:60:68:51:56:a2:59: 89:8c:e7:ce:c6:13:d9:59:5b:f2:8d:09:4a:7c:84:9c: 1c:11:6a:77:e1:4d:8b:32:72:5f:61:a2:7e:e3:5f:89: 1e:bb:86:5f:6e:7e:b5:87:77:fb:99:20:86:6e:ab:1c: d1:f3:aa:6c:a6:44:10:35:be:12:9a:b8:6d:57:88:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 35:76:b9:e0:e7:f0:dd:e6:5b:a9:64:f1:99:90:f0:c5: 90:e3:db:35:95:86:2b:da:4f:21:73:d3:cb:ee:9f:c6: 3f:96:12:d5:f7:2f:bf:2c:97:93:00:94:1e:63:30:41: ed:75:89:8b:4f:c3:7b:ad:05:16:f9:ef:36:41:0d:cc: 56:85:28:54:5c:b1:6f:6c:43:d2:1e:0a:c2:19:8b:96: 0c:ae:2c:81:0b:4e:75:08:84:28:6b:f6:08:20:b4:93: 87:82:7d:67:4d:85:21:ff:a6:a6:af:33:cb:eb:37:b7: b3:72:1e:7b:04:a8:2b:14:2a:a1:f6:8d:ab:8b:61:1f Fingerprint (MD5): 9F:1A:50:76:DD:7D:98:2C:3C:27:8A:3C:DD:2E:F0:8D Fingerprint (SHA1): 89:53:BD:E4:72:27:8D:CF:44:E7:95:A7:75:9E:81:1F:40:E0:75:FE Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4360: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:c1 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:49 2012 Not After : Tue Jun 26 21:50:49 2012 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:01:5c:af:d9:35:b0:ed:6b:23:c6:4d:8e:09:06:c4: 6a:f5:ea:78:f6:0d:17:80:aa:12:8b:af:a4:33:e7:ab: 3c:59:cf:9a:11:65:e4:e8:65:a8:e4:52:4a:6c:6c:10: 23:65:fe:c1:cc:78:17:f8:ea:4d:2f:f1:ef:00:0a:2d: 1f:6d:49:a5:89:d6:b4:6d:a5:b9:3c:38:ce:2e:42:2b: 54:3b:51:f2:e2:85:fa:62:6b:49:5b:fe:ec:62:b7:73: 83:d3:08:ac:9d:03:7b:d6:8e:56:56:77:87:6d:ba:c9: f7:3d:0a:49:bc:1f:5a:15:fe:25:a1:02:1c:17:12:ed Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8e:98:bc:64:dc:6a:f1:51:b6:91:a7:be:fe:0b:55:ff: 27:52:7e:85:ec:03:cb:58:72:f6:30:91:e5:bd:0a:9a: 86:a6:66:df:d5:25:e3:a3:65:0b:12:61:b6:e6:59:57: 62:fe:ea:69:16:9e:d4:bc:9d:65:3c:46:cb:69:f4:8a: e0:22:6c:5c:ef:74:1a:e9:1a:70:3d:df:6e:e1:d6:06: 2e:57:55:a7:d1:27:2a:eb:9f:df:0f:34:9f:9f:e8:06: e1:5a:0b:5c:e1:48:3b:34:0a:b2:7f:eb:49:d5:3e:4c: a3:84:aa:21:f3:e7:9a:41:df:72:aa:32:34:93:0f:27 Fingerprint (MD5): 9E:4D:39:27:B6:62:62:51:42:1B:45:BF:35:7A:17:CA Fingerprint (SHA1): 2E:8A:15:33:AA:22:03:D5:D5:A2:A1:5A:07:90:0D:67:7A:35:22:9D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4361: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:c2 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:50 2012 Not After : Tue Jun 26 21:50:50 2012 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:3a:ae:04:cf:44:bf:37:6b:83:5d:0e:14:5e:3e:3a: a3:1b:cc:3e:6d:17:fb:0b:f2:17:3d:14:8e:9b:e4:e2: 73:6d:c1:2e:ab:54:b2:16:43:54:df:c4:24:aa:91:d1: 89:30:0f:71:f6:24:b1:f2:b7:28:e8:f2:3f:58:29:cb: 74:e3:9e:39:ad:6b:7c:dc:ce:29:fa:a1:94:ae:95:f8: 2d:33:40:de:5c:1a:2c:90:e7:a8:d2:9d:f3:a7:4b:f4: ff:0a:21:37:ee:01:57:63:0e:26:c0:a9:c0:06:68:f7: c4:ec:03:e8:17:67:6a:74:bd:1a:50:1a:44:29:00:21 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 18:ec:67:9d:47:50:bc:84:f7:56:fc:ba:55:59:4b:49: 27:01:02:a0:2e:a9:be:67:68:f6:52:a6:c6:e6:34:90: f0:08:e1:29:15:cf:98:4b:26:6f:2f:7c:8f:c9:02:5c: 6b:0b:62:43:ea:f5:1f:d9:e2:5e:e1:e7:06:06:99:ed: d6:24:e5:f4:0e:1e:4b:29:b3:04:70:34:cc:66:c3:a6: 22:96:9b:bf:0e:b3:39:2c:12:80:17:28:8d:91:68:f7: 28:de:1e:73:8c:b1:35:a0:46:45:dc:fb:93:5f:71:f1: 04:a7:de:ce:2b:af:12:dd:4b:99:46:c7:81:ea:0a:00 Fingerprint (MD5): 64:FF:18:73:06:AA:07:F9:EE:54:A8:DA:A9:8A:61:71 Fingerprint (SHA1): E1:13:33:B4:08:51:D7:BF:B4:2A:BD:78:43:F0:72:15:E6:44:E8:10 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4362: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:51 2012 Not After : Tue Jun 26 21:50:51 2012 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:98:52:27:11:63:1b:1d:9b:7b:21:b1:d9:44:74:34: 11:38:47:23:78:d4:7e:f2:a5:65:53:8c:a7:9b:39:00: d0:da:ad:62:16:70:b7:8d:92:b4:3a:8b:8c:a6:c0:1a: 93:6a:29:c0:58:ae:96:05:2a:c7:51:5e:9c:b2:d9:af: f5:3c:f7:fc:05:bc:0b:49:9c:df:f4:78:28:18:de:2d: be:df:22:d4:f7:a2:3e:25:db:86:1d:7d:d6:a5:ac:39: 61:d6:6f:82:9e:4e:e1:13:07:ee:c1:66:70:23:e3:40: 0c:14:d2:5a:e1:20:f1:cb:de:38:56:94:0c:75:ed:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:49:c9:4b:fd:86:62:7a:8f:a3:41:c1:36:3d:9c:7b: 3f:7a:be:cf:de:76:23:1a:4d:c1:16:7c:3c:3d:7f:e7: 99:fc:f7:10:b8:56:00:91:55:8b:ba:e9:d2:d9:25:d2: 0b:49:0a:09:c7:f9:fe:72:72:cc:c4:5f:f7:ab:8b:98: 1b:c1:88:f1:9d:46:fc:cf:01:b8:bd:11:47:03:b9:42: 3c:bb:e7:25:9c:5a:fe:1e:12:6d:d5:52:0a:6b:2c:ce: a2:90:ee:67:e3:c0:91:26:a3:40:0d:83:b1:24:d3:f7: dc:0c:cb:ab:88:26:99:1c:78:74:8e:b6:1a:0c:7b:6f Fingerprint (MD5): 32:05:B8:B5:35:A3:5A:1D:1D:8C:87:56:8C:B2:C9:22 Fingerprint (SHA1): 08:F4:25:5D:74:A6:E9:44:98:B0:1E:13:97:02:72:39:37:E7:3F:2E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4363: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:c5 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:51 2012 Not After : Tue Jun 26 21:50:51 2012 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bf:53:6b:14:02:3b:d4:ba:b1:71:05:06:8d:a8:01: e7:1b:4c:cb:f3:f0:72:de:8f:07:78:32:95:c3:d1:1e: 86:a2:3b:23:6b:87:6d:24:79:43:2d:77:ab:d5:4c:e1: 01:36:3f:f2:9f:a6:89:21:18:f1:a5:58:b0:1c:ad:ad: 61:30:53:65:d9:9a:2a:cd:58:47:14:bd:fd:6f:08:63: ab:57:3f:4f:32:27:a4:1e:2f:41:8d:a7:0d:11:12:9c: 6a:85:cd:e9:17:e0:67:f3:71:92:16:76:85:12:72:11: 52:c7:56:47:ea:7c:9e:32:d3:2c:2f:ca:88:78:12:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 78:cd:ad:ca:e5:9d:63:b2:e7:8a:6e:cc:6a:60:bc:83: d9:93:81:ec:a5:06:b1:2e:72:60:45:aa:de:33:64:a8: f6:c5:01:54:ab:f0:72:e0:bf:60:c8:4b:b8:ad:88:c6: a4:15:47:b4:f6:9e:81:94:fa:f8:ef:5e:1a:5a:45:aa: 29:31:7e:8c:76:9e:a7:b6:b7:55:c0:c1:4d:14:aa:bc: 45:e7:e5:4d:2e:2a:49:eb:3c:a2:65:7a:91:55:b6:e2: b4:85:5d:2c:35:e1:eb:36:7a:e0:67:2e:81:36:ba:e2: fc:c4:f2:3b:a6:84:39:6e:61:f6:e4:c9:fb:1d:05:60 Fingerprint (MD5): CF:FC:AC:F4:8A:C8:C1:AC:52:A2:1A:9F:96:40:3D:0E Fingerprint (SHA1): AC:B8:58:57:01:5E:40:33:28:B7:8E:4E:2F:61:F1:E9:6D:70:78:84 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4364: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8b:c7 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:50:52 2012 Not After : Tue Jun 26 21:50:52 2012 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:df:c8:63:45:be:d0:89:b1:bb:d0:f3:b1:31:1d:e5: 1a:13:6a:24:f8:fc:c4:47:5b:82:42:44:c6:14:f0:f6: 5b:96:ca:e8:64:7e:f6:1a:2f:a1:cf:b2:2e:94:78:44: 04:0a:a8:85:5c:c9:e6:07:7c:12:c2:7f:6c:28:3a:99: 73:d3:c9:5c:e0:4f:50:7b:8b:ad:3e:b6:29:45:65:99: 3c:f4:ff:c2:08:0e:a8:20:06:eb:97:c9:6d:58:29:dc: e0:68:4b:dc:e5:58:3d:04:ad:c9:b6:8e:e6:e2:fd:b9: f6:1d:98:39:55:56:65:eb:09:c8:7c:f1:1f:13:45:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4a:34:56:b3:61:5c:03:9e:9d:8f:25:89:09:4f:55:a7: 62:e5:12:70:e0:df:43:27:87:a7:a8:d3:b2:38:56:c5: f7:5e:79:05:44:9f:5d:eb:6f:d8:32:62:b0:18:0e:54: 79:fa:41:e6:9a:46:62:5d:9b:a7:87:39:54:6f:ce:c7: b8:d3:0c:19:27:d2:fb:fb:6c:67:05:a9:b5:ac:68:57: ca:fb:65:0a:36:6d:51:07:af:73:13:dc:2a:11:af:31: 12:37:56:24:ee:fd:9b:da:5a:eb:af:2d:98:64:51:1b: 1b:02:9f:77:5a:3e:8a:f8:08:89:b3:ea:3c:9f:d5:fd Fingerprint (MD5): AE:64:E6:72:47:02:72:22:16:5B:03:FF:03:29:C0:DA Fingerprint (SHA1): FE:ED:E1:33:4F:C8:5F:16:CD:09:5A:54:11:27:72:47:8C:DA:11:68 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4365: Certificate Key Usage Extension (11) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #4366: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4367: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4368: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #4369: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #4370: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... cert.sh: #4371: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #4372: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #4373: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4374: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #4375: Import Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4376: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #4377: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert cert.sh: #4378: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #4379: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4380: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #4381: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #4382: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4383: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: `./req' and `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #4384: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert cert.sh: #4385: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4386: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4387: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4388: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4389: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4390: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4391: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4392: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4393: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4394: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4395: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4396: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4397: Verify Distrusted Cert for Object Signer - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4398: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #4399: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert cert.sh: #4400: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4401: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #4402: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert cert.sh: #4403: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4404: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #4405: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert cert.sh: #4406: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4407: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #4408: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert cert.sh: #4409: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4410: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #4411: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert cert.sh: #4412: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4413: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #4414: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert cert.sh: #4415: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4416: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #4417: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert cert.sh: #4418: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4419: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #4420: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert cert.sh: #4421: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4422: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #4423: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert cert.sh: #4424: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4425: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #4426: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert cert.sh: #4427: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4428: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #4429: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert cert.sh: #4430: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4431: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #4432: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert cert.sh: #4433: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4434: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #4435: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert cert.sh: #4436: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #4437: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #4438: Modify CRL by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #4439: Modify CRL by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #4440: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #4441: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. cert.sh: #4442: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #4443: Importing CRL for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Mar 26 17:51:17 EDT 2012 Running tests for dbtests TIMESTAMP dbtests BEGIN: Mon Mar 26 17:51:17 EDT 2012 ./dbtests.sh: line 206: syntax error near unexpected token `then' ./dbtests.sh: line 206: ` if [[ $EUID -ne 0 ]] then' TIMESTAMP dbtests END: Mon Mar 26 17:51:17 EDT 2012 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 26 17:51:17 EDT 2012 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4444: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:f4:b8:0e:9a:18:93:cc:0d:2f:43:8f:b4:f6:6b:dd Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4445: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4446: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4447: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 01:3b:c7:b5:bc:9e:94:32:c1:f9:80:86:26:20:b3:c3 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4448: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4449: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4450: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 73:80:4b:27:01:dd:05:81:6e:a1:ab:4d:ca:0e:c1:16 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4451: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4452: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4453: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7f:99:a8:ce:8e:10:7d:fe:18:64:63:04:9f:dd:ba:b4 Iteration Count: 1 (0x1) tools.sh: #4454: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4455: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4456: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7c:c5:40:47:03:4b:69:92:e1:17:99:df:2f:44:f0:df Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4457: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4458: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4459: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bb:86:9c:c0:81:8b:ef:31:ef:fe:c8:5b:4c:7f:82:2d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4460: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4461: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4462: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:74:5c:60:b0:5c:9f:3a:61:69:c6:5c:52:fc:28:07 Iteration Count: 1 (0x1) tools.sh: #4463: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4464: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4465: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 17:2e:d9:69:2f:1a:18:30:d6:bf:63:c1:f8:5c:e6:0c Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:13:c3:79:46:a9:d2:64:bb:ba:9a:66:a4:bc:45: e4:9b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4466: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4467: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4468: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1d:3a:a0:76:69:68:02:66:f5:9c:a7:5d:3f:86:a3:2b Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:bc:17:61:bf:39:c4:ef:88:29:71:93:72:d9:08: aa:bd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4469: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4470: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4471: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: db:ce:a0:e7:04:00:77:94:6e:9c:ee:c4:df:d5:57:d4 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:4c:aa:b9:bd:ea:38:c7:e7:e0:cd:16:0d:a6:9b: 15:77 tools.sh: #4472: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4473: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4474: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3c:2f:c5:d0:7d:59:85:b9:a0:ae:33:32:1d:d3:61:a7 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:b5:6a:2b:4a:14:b1:66:86:72:31:0f:c0:7d:38: 78:00 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4475: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4476: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4477: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2a:7f:2f:cb:36:a1:cf:c7:e8:cc:ed:b7:f2:68:d7:3e Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:60:72:8f:8f:2e:14:5b:55:b7:dc:3a:dc:01:13: 8e:8c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4478: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4479: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4480: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 48:2c:cf:0d:5a:a2:d2:57:36:51:46:a0:c2:29:e4:74 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:46:f4:9b:1c:35:a8:2b:7c:25:31:f6:e1:fc:1c: 13:59 tools.sh: #4481: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4482: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4483: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:7d:f1:34:14:78:be:17:45:74:44:eb:fd:37:2d:71 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b1:f4:1a:a6:d4:7a:97:99:35:35:a3:d8:31:39: b8:4a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4484: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4485: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4486: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 82:26:d5:bd:b8:dc:f7:63:71:a1:8f:7d:25:d3:da:b8 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:65:2c:3d:e1:88:c2:34:ae:b0:5c:0c:77:8b:8c: a7:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4487: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4488: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4489: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2f:a7:4e:df:fa:41:17:96:85:38:ed:47:d2:2c:1b:5a Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f3:6a:c6:e4:2b:66:e7:8b:a0:36:0d:1b:22:f1: c5:ef tools.sh: #4490: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4491: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4492: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 25:46:90:8f:59:f3:38:bc:a4:75:f5:5c:8b:29:c1:a5 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:ee:74:bb:d2:47:6c:a1:b1:55:1e:8b:38:2e:0a: 57:65 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4493: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4494: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4495: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:ec:99:a0:72:6e:1a:33:dc:f2:50:37:21:33:78:1f Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:5c:19:79:0c:0b:33:fe:9f:1f:46:80:c6:01:8e: 51:69 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4496: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4497: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4498: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 62:72:7d:bf:81:84:6f:46:5d:f5:ad:02:45:a2:a4:af Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:d4:22:69:5e:92:3b:96:f3:ad:d6:db:36:f8:b0: c2:f8 tools.sh: #4499: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4500: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4501: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 31:24:97:8f:b5:5d:fb:9d:e9:03:18:80:0d:f5:62:29 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:00:71:0c:79:a4:02:a2:25:39:75:fd:ff:6d:9a: b2:dc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4502: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4503: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4504: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 81:c3:cb:d0:b6:a3:ae:4b:e6:b8:80:f5:a8:e4:d2:df Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:d4:8c:4f:fa:22:9a:84:ee:1f:67:a3:14:36:08: e6:e2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4505: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4506: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4507: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:76:ac:62:cf:1c:12:d5:2a:5b:4e:35:81:a2:d0:c0 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:f4:46:96:b3:9f:ac:ea:6b:bd:af:a7:01:1e:c9: 5d:02 tools.sh: #4508: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4509: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4510: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 82:52:10:ee:2e:51:43:34:61:68:f2:ff:df:11:73:a9 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:26:40:55:de:9b:86:04:28:2f:d5:da:de:0e:de: e4:be Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4511: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4512: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4513: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 69:fa:36:98:ea:a2:59:50:34:38:5a:42:fb:e0:98:e1 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:7f:88:84:99:5b:f6:c6:65:c1:df:07:03:e7:e7: 39:84 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4514: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4515: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4516: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:ba:df:93:54:f1:96:a1:7e:c5:93:ea:ea:ac:f6:ea Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:65:64:2b:bd:db:dc:4f:42:3b:26:2b:33:46:8e: 64:ae tools.sh: #4517: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4518: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4519: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 58:7f:c5:98:37:d3:67:b1:d7:45:8c:20:b4:cb:88:03 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4520: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4521: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4522: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 2f:ad:65:4c:07:36:6f:61:49:73:e5:1c:e6:5b:37:1c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4523: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4524: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4525: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 46:c4:52:38:17:9c:4e:bd:2b:6f:50:79:01:cc:68:0c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4526: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4527: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4528: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d0:12:ea:ee:cb:0e:6f:15:3d:a0:90:72:87:91:5e:30 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4529: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4530: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4531: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 31:19:22:0c:ce:81:c3:14:91:b6:9b:2f:1e:71:66:a2 Iteration Count: 1 (0x1) tools.sh: #4532: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4533: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4534: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 77:ee:e4:a8:0e:f6:ce:20:ae:3b:e2:85:66:00:86:7e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4535: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4536: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4537: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 90:93:5f:cc:d8:99:1c:cb:13:89:8a:d1:63:93:65:74 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4538: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4539: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4540: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 41:bf:c8:ee:2d:76:11:50:f9:81:3e:5d:98:df:2d:52 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4541: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4542: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4543: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5a:19:4b:76:17:2b:39:16:32:1c:7f:28:d5:96:c0:a2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4544: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4545: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4546: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 4c:93:3c:af:c5:de:96:4d:c4:8b:ba:9b:e8:12:53:51 Iteration Count: 1 (0x1) tools.sh: #4547: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4548: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ab:37:a4:38:a3:b4:be:45:28:52:92:f7:74:6e:20:af Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4550: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4551: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4552: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f6:e4:3f:e8:de:84:ca:43:fb:13:e6:5c:39:57:ad:9c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4553: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4554: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4555: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a9:fb:30:72:9f:a5:f9:c6:94:d9:3d:06:0a:7a:75:72 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4556: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4557: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4558: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8c:2d:e0:75:7d:c1:1e:3e:bd:9b:42:bf:4c:27:eb:9e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4559: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4560: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4561: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2b:dd:a4:27:4a:49:4b:a3:c0:5d:d9:50:cc:13:d8:d1 Iteration Count: 1 (0x1) tools.sh: #4562: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4563: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4564: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 46:f7:c0:42:5f:6c:29:c6:0a:4d:f1:19:bc:c9:bc:0e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4565: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4566: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4567: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7d:36:fd:23:ef:2a:d7:bd:09:21:e9:22:dd:df:b6:68 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4568: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4569: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4570: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4c:f3:28:c8:90:d2:99:15:ab:37:f0:f6:59:a6:83:08 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4571: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4572: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4573: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 99:2d:83:8d:42:e1:f6:19:1c:f0:7c:1d:f0:f9:19:10 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4574: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4575: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4576: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 08:89:1a:7e:32:45:9c:2f:08:24:84:89:f6:1b:7e:0f Iteration Count: 1 (0x1) tools.sh: #4577: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4578: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4579: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 79:54:47:64:37:1e:1a:64:53:14:ab:47:67:48:41:98 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4580: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4581: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4582: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9d:61:cc:2f:eb:69:c1:5d:eb:f6:53:de:b1:af:0a:cb Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4583: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4584: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4585: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:96:eb:67:85:1c:ff:2a:bd:17:09:cc:40:7e:36:6e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4586: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4587: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4588: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:14:0b:a1:2b:bd:c0:72:ee:b6:d9:9d:a0:04:90:28 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4589: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4590: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4591: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f5:b9:0d:5d:e0:7f:fb:22:28:30:55:6c:67:53:38:a2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4592: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4593: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4594: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:1b:06:e3:1d:f6:7e:89:12:c3:0f:cb:f9:ac:4c:fa Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4595: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4596: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4597: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fb:e3:4a:22:83:d1:22:37:9f:cb:86:f1:73:2c:3a:fd Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4598: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4599: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4600: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 66:9f:f2:b7:19:e5:0a:a7:6e:b4:92:bc:9e:a1:33:96 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4601: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4602: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4603: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:95:7a:c6:5f:78:6e:40:93:63:25:d2:88:a5:92:71 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4604: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4605: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4606: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:92:3b:11:14:c9:11:a7:19:5e:5d:5a:7d:83:ff:4c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:ca:5d:93:79:56:26:ac:25:2b:0d:29:d8:45:a2: d0:6a:65:35:50:4b:11:88:c5:b1:54:b0:14:d8:7e:16: 46:2a:3d:65:4b:f1:17:43:b7:a5:d2:58:ee:b7:62:5c: 5a:21:31:a1:71:f3:a0:b4:e3:b8:37:71:1f:e5:df:ad: b2:0e:80:4f:1f:11:b0:57:cc:84:a8:76:37:d5:5f:ea: d5:15:87:bb:67:34:2c:b5:eb:a0:a4:bb:b8:fb:00:29: 02:2b:38:d1:12:da:af:83:a8:9d:4e:c1:ed:e0:28:ce: d5:1e:be:4d:35:16:0d:63:78:0c:e8:4c:a8:3b:d5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:81:60:33:da:66:39:c1:95:bb:43:af:74:9d:0f:2e: e0:f3:d2:69:6d:53:3b:49:9f:04:db:7b:cd:7b:87:33: 56:02:a6:7c:87:7e:6e:9d:5d:fc:71:23:1d:58:66:ba: a5:7e:4d:91:4f:a1:e9:89:5a:cd:95:b0:26:67:14:2f: fe:ab:61:f0:db:1d:0c:8c:ac:3e:d8:e1:ee:58:8e:b7: 1e:55:66:a1:a8:44:d3:0a:1d:b9:5a:69:9a:96:6c:bc: 10:61:d4:aa:e1:26:de:65:07:35:38:b3:fb:f5:02:6c: 01:c2:bc:66:9e:eb:a4:be:05:80:dc:4a:93:7c:66:04 Fingerprint (MD5): 9F:67:4D:81:47:10:5D:71:6D:52:2B:AB:F9:19:06:5F Fingerprint (SHA1): 48:BD:1D:04:3A:9B:B1:3E:54:81:E4:D9:BD:B7:B5:06:68:A5:FE:F2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:50:36 2012 Not After : Sun Mar 26 21:50:36 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:72:06:73:40:00:75:fc:21:89:7e:aa:9e:15:2d:a3: 0f:30:bc:c5:89:75:0b:35:77:57:40:e6:a0:f1:18:a4: 7b:dd:28:7d:c5:22:11:d7:00:d6:b0:ec:e5:b1:58:41: c6:ef:21:59:5f:65:98:4f:10:33:f2:3e:db:0c:3d:af: a5:bb:84:8a:68:63:6c:cc:18:4c:97:9f:15:3d:49:4c: 7c:10:43:bd:2d:60:91:4e:88:da:1e:57:a7:33:6b:bc: 86:74:ee:c6:5a:e1:87:01:c6:9a:38:be:e1:14:69:bf: 12:8f:3d:bf:2c:b3:53:c6:a9:f4:ac:30:8d:ab:12:27 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 39:b1:bf:5b:9a:0e:04:6f:e3:6d:7a:2d:32:54:dd:86: 41:c9:4a:67:d7:d8:89:b5:68:ee:6e:dc:a1:2e:0d:14: 8e:97:5c:0b:d4:f9:4e:29:4a:b1:64:a0:4c:33:72:2d: ce:76:c3:b9:f1:68:4c:7e:d1:44:32:93:97:c7:4d:cd: a0:74:6a:a8:1c:b9:65:b1:2d:94:c7:66:4d:c2:03:12: f5:23:b7:be:83:66:45:dd:cf:c3:03:a0:48:f8:a5:e4: f3:c0:63:c3:0d:27:e5:16:51:59:e8:25:40:44:42:9f: 51:6c:e3:8f:92:95:cf:be:a2:ef:ea:0a:8f:fd:13:1f Fingerprint (MD5): B9:12:E7:74:DC:73:B9:CC:88:11:DB:33:B3:D3:56:C1 Fingerprint (SHA1): FA:B0:1E:44:3E:CC:F1:E7:C8:3F:63:FE:43:4E:A4:50:4A:98:DE:79 Friendly Name: Alice tools.sh: #4607: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4608: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #4609: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4610: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #4611: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #4612: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #4613: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #4614: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #4615: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #4616: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #4617: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Mar 26 17:51:43 EDT 2012 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 26 17:51:43 EDT 2012 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #4618: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #4619: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 92df92cf146475cefcc461354db1c683dd7d8abb NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #4620: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #4621: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #4622: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #4623: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #4624: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #4625: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #4626: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #4627: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #4628: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #4629: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #4630: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 92df92cf146475cefcc461354db1c683dd7d8abb FIPS_PUB_140_Test_Certificate fips.sh: #4631: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #4632: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #4633: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #4634: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #4635: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 92df92cf146475cefcc461354db1c683dd7d8abb FIPS_PUB_140_Test_Certificate fips.sh: #4636: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #4637: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #4638: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_64_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000f3d73 (998771): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #4639: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 26 17:51:55 EDT 2012 Running tests for crmf TIMESTAMP crmf BEGIN: Mon Mar 26 17:51:55 EDT 2012 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #4640: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #4641: CMMF test . - PASSED TIMESTAMP crmf END: Mon Mar 26 17:51:55 EDT 2012 Running tests for smime TIMESTAMP smime BEGIN: Mon Mar 26 17:51:55 EDT 2012 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #4642: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4643: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #4644: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #4645: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #4646: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #4647: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4648: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #4649: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #4650: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #4651: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #4652: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4653: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #4654: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #4655: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #4656: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #4657: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4658: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #4659: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #4660: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #4661: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #4662: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #4663: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #4664: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #4665: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #4666: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #4667: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #4668: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #4669: Decrypt with a Multiple Email cert . - PASSED smime.sh: #4670: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #4671: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #4672: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #4673: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #4674: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #4675: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #4676: Decode Encrypted-Data . - PASSED smime.sh: #4677: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #4678: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #4679: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #4680: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #4681: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #4682: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Mar 26 17:51:57 EDT 2012 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 26 17:51:57 EDT 2012 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:51:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:51:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2406 >/dev/null 2>/dev/null selfserv_9793 with PID 2406 found at Mon Mar 26 17:51:57 EDT 2012 selfserv_9793 with PID 2406 started at Mon Mar 26 17:51:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4683: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2406 at Mon Mar 26 17:51:58 EDT 2012 kill -USR1 2406 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2406 killed at Mon Mar 26 17:51:58 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:51:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:51:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2462 >/dev/null 2>/dev/null selfserv_9793 with PID 2462 found at Mon Mar 26 17:51:58 EDT 2012 selfserv_9793 with PID 2462 started at Mon Mar 26 17:51:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4684: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2462 at Mon Mar 26 17:51:58 EDT 2012 kill -USR1 2462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2462 killed at Mon Mar 26 17:51:58 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:51:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:51:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2518 >/dev/null 2>/dev/null selfserv_9793 with PID 2518 found at Mon Mar 26 17:51:58 EDT 2012 selfserv_9793 with PID 2518 started at Mon Mar 26 17:51:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4685: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2518 at Mon Mar 26 17:51:58 EDT 2012 kill -USR1 2518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2518 killed at Mon Mar 26 17:51:58 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:51:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:51:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2586 >/dev/null 2>/dev/null selfserv_9793 with PID 2586 found at Mon Mar 26 17:51:58 EDT 2012 selfserv_9793 with PID 2586 started at Mon Mar 26 17:51:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4686: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2586 at Mon Mar 26 17:51:58 EDT 2012 kill -USR1 2586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2586 killed at Mon Mar 26 17:51:58 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:51:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:51:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2642 >/dev/null 2>/dev/null selfserv_9793 with PID 2642 found at Mon Mar 26 17:51:59 EDT 2012 selfserv_9793 with PID 2642 started at Mon Mar 26 17:51:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4687: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2642 at Mon Mar 26 17:51:59 EDT 2012 kill -USR1 2642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2642 killed at Mon Mar 26 17:51:59 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:51:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:51:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2698 >/dev/null 2>/dev/null selfserv_9793 with PID 2698 found at Mon Mar 26 17:51:59 EDT 2012 selfserv_9793 with PID 2698 started at Mon Mar 26 17:51:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4688: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2698 at Mon Mar 26 17:52:00 EDT 2012 kill -USR1 2698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2698 killed at Mon Mar 26 17:52:00 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2766 >/dev/null 2>/dev/null selfserv_9793 with PID 2766 found at Mon Mar 26 17:52:00 EDT 2012 selfserv_9793 with PID 2766 started at Mon Mar 26 17:52:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4689: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 2766 at Mon Mar 26 17:52:00 EDT 2012 kill -USR1 2766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2766 killed at Mon Mar 26 17:52:00 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2822 >/dev/null 2>/dev/null selfserv_9793 with PID 2822 found at Mon Mar 26 17:52:00 EDT 2012 selfserv_9793 with PID 2822 started at Mon Mar 26 17:52:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4690: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 2822 at Mon Mar 26 17:52:00 EDT 2012 kill -USR1 2822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2822 killed at Mon Mar 26 17:52:00 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2878 >/dev/null 2>/dev/null selfserv_9793 with PID 2878 found at Mon Mar 26 17:52:00 EDT 2012 selfserv_9793 with PID 2878 started at Mon Mar 26 17:52:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4691: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 2878 at Mon Mar 26 17:52:01 EDT 2012 kill -USR1 2878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2878 killed at Mon Mar 26 17:52:01 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 2946 >/dev/null 2>/dev/null selfserv_9793 with PID 2946 found at Mon Mar 26 17:52:01 EDT 2012 selfserv_9793 with PID 2946 started at Mon Mar 26 17:52:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4692: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 2946 at Mon Mar 26 17:52:01 EDT 2012 kill -USR1 2946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 2946 killed at Mon Mar 26 17:52:01 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3002 >/dev/null 2>/dev/null selfserv_9793 with PID 3002 found at Mon Mar 26 17:52:01 EDT 2012 selfserv_9793 with PID 3002 started at Mon Mar 26 17:52:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4693: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 3002 at Mon Mar 26 17:52:01 EDT 2012 kill -USR1 3002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3002 killed at Mon Mar 26 17:52:01 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3058 >/dev/null 2>/dev/null selfserv_9793 with PID 3058 found at Mon Mar 26 17:52:01 EDT 2012 selfserv_9793 with PID 3058 started at Mon Mar 26 17:52:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4694: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 3058 at Mon Mar 26 17:52:01 EDT 2012 kill -USR1 3058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3058 killed at Mon Mar 26 17:52:01 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3126 >/dev/null 2>/dev/null selfserv_9793 with PID 3126 found at Mon Mar 26 17:52:01 EDT 2012 selfserv_9793 with PID 3126 started at Mon Mar 26 17:52:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4695: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 3126 at Mon Mar 26 17:52:02 EDT 2012 kill -USR1 3126 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3126 killed at Mon Mar 26 17:52:02 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3182 >/dev/null 2>/dev/null selfserv_9793 with PID 3182 found at Mon Mar 26 17:52:02 EDT 2012 selfserv_9793 with PID 3182 started at Mon Mar 26 17:52:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4696: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 3182 at Mon Mar 26 17:52:02 EDT 2012 kill -USR1 3182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3182 killed at Mon Mar 26 17:52:02 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3238 >/dev/null 2>/dev/null selfserv_9793 with PID 3238 found at Mon Mar 26 17:52:02 EDT 2012 selfserv_9793 with PID 3238 started at Mon Mar 26 17:52:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4697: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 3238 at Mon Mar 26 17:52:02 EDT 2012 kill -USR1 3238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3238 killed at Mon Mar 26 17:52:02 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3306 >/dev/null 2>/dev/null selfserv_9793 with PID 3306 found at Mon Mar 26 17:52:02 EDT 2012 selfserv_9793 with PID 3306 started at Mon Mar 26 17:52:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4698: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 3306 at Mon Mar 26 17:52:02 EDT 2012 kill -USR1 3306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3306 killed at Mon Mar 26 17:52:02 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3362 >/dev/null 2>/dev/null selfserv_9793 with PID 3362 found at Mon Mar 26 17:52:02 EDT 2012 selfserv_9793 with PID 3362 started at Mon Mar 26 17:52:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4699: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3362 at Mon Mar 26 17:52:03 EDT 2012 kill -USR1 3362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3362 killed at Mon Mar 26 17:52:03 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3418 >/dev/null 2>/dev/null selfserv_9793 with PID 3418 found at Mon Mar 26 17:52:03 EDT 2012 selfserv_9793 with PID 3418 started at Mon Mar 26 17:52:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4700: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 3418 at Mon Mar 26 17:52:03 EDT 2012 kill -USR1 3418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3418 killed at Mon Mar 26 17:52:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3486 >/dev/null 2>/dev/null selfserv_9793 with PID 3486 found at Mon Mar 26 17:52:03 EDT 2012 selfserv_9793 with PID 3486 started at Mon Mar 26 17:52:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4701: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3486 at Mon Mar 26 17:52:03 EDT 2012 kill -USR1 3486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3486 killed at Mon Mar 26 17:52:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3542 >/dev/null 2>/dev/null selfserv_9793 with PID 3542 found at Mon Mar 26 17:52:03 EDT 2012 selfserv_9793 with PID 3542 started at Mon Mar 26 17:52:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4702: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3542 at Mon Mar 26 17:52:03 EDT 2012 kill -USR1 3542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3542 killed at Mon Mar 26 17:52:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3598 >/dev/null 2>/dev/null selfserv_9793 with PID 3598 found at Mon Mar 26 17:52:04 EDT 2012 selfserv_9793 with PID 3598 started at Mon Mar 26 17:52:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4703: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3598 at Mon Mar 26 17:52:04 EDT 2012 kill -USR1 3598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3598 killed at Mon Mar 26 17:52:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3666 >/dev/null 2>/dev/null selfserv_9793 with PID 3666 found at Mon Mar 26 17:52:04 EDT 2012 selfserv_9793 with PID 3666 started at Mon Mar 26 17:52:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4704: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3666 at Mon Mar 26 17:52:04 EDT 2012 kill -USR1 3666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3666 killed at Mon Mar 26 17:52:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3722 >/dev/null 2>/dev/null selfserv_9793 with PID 3722 found at Mon Mar 26 17:52:04 EDT 2012 selfserv_9793 with PID 3722 started at Mon Mar 26 17:52:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4705: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3722 at Mon Mar 26 17:52:04 EDT 2012 kill -USR1 3722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3722 killed at Mon Mar 26 17:52:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3778 >/dev/null 2>/dev/null selfserv_9793 with PID 3778 found at Mon Mar 26 17:52:04 EDT 2012 selfserv_9793 with PID 3778 started at Mon Mar 26 17:52:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4706: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3778 at Mon Mar 26 17:52:05 EDT 2012 kill -USR1 3778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3778 killed at Mon Mar 26 17:52:05 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3846 >/dev/null 2>/dev/null selfserv_9793 with PID 3846 found at Mon Mar 26 17:52:05 EDT 2012 selfserv_9793 with PID 3846 started at Mon Mar 26 17:52:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4707: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 3846 at Mon Mar 26 17:52:05 EDT 2012 kill -USR1 3846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3846 killed at Mon Mar 26 17:52:05 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3902 >/dev/null 2>/dev/null selfserv_9793 with PID 3902 found at Mon Mar 26 17:52:05 EDT 2012 selfserv_9793 with PID 3902 started at Mon Mar 26 17:52:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4708: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 3902 at Mon Mar 26 17:52:05 EDT 2012 kill -USR1 3902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3902 killed at Mon Mar 26 17:52:05 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 3958 >/dev/null 2>/dev/null selfserv_9793 with PID 3958 found at Mon Mar 26 17:52:05 EDT 2012 selfserv_9793 with PID 3958 started at Mon Mar 26 17:52:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4709: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 3958 at Mon Mar 26 17:52:05 EDT 2012 kill -USR1 3958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 3958 killed at Mon Mar 26 17:52:05 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4026 >/dev/null 2>/dev/null selfserv_9793 with PID 4026 found at Mon Mar 26 17:52:05 EDT 2012 selfserv_9793 with PID 4026 started at Mon Mar 26 17:52:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4710: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 4026 at Mon Mar 26 17:52:06 EDT 2012 kill -USR1 4026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4026 killed at Mon Mar 26 17:52:06 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4082 >/dev/null 2>/dev/null selfserv_9793 with PID 4082 found at Mon Mar 26 17:52:06 EDT 2012 selfserv_9793 with PID 4082 started at Mon Mar 26 17:52:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4711: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 4082 at Mon Mar 26 17:52:06 EDT 2012 kill -USR1 4082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4082 killed at Mon Mar 26 17:52:06 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4138 >/dev/null 2>/dev/null selfserv_9793 with PID 4138 found at Mon Mar 26 17:52:06 EDT 2012 selfserv_9793 with PID 4138 started at Mon Mar 26 17:52:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4712: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 4138 at Mon Mar 26 17:52:06 EDT 2012 kill -USR1 4138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4138 killed at Mon Mar 26 17:52:06 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4206 >/dev/null 2>/dev/null selfserv_9793 with PID 4206 found at Mon Mar 26 17:52:06 EDT 2012 selfserv_9793 with PID 4206 started at Mon Mar 26 17:52:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4713: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 4206 at Mon Mar 26 17:52:06 EDT 2012 kill -USR1 4206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4206 killed at Mon Mar 26 17:52:06 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4262 >/dev/null 2>/dev/null selfserv_9793 with PID 4262 found at Mon Mar 26 17:52:07 EDT 2012 selfserv_9793 with PID 4262 started at Mon Mar 26 17:52:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4714: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 4262 at Mon Mar 26 17:52:07 EDT 2012 kill -USR1 4262 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4262 killed at Mon Mar 26 17:52:07 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4318 >/dev/null 2>/dev/null selfserv_9793 with PID 4318 found at Mon Mar 26 17:52:07 EDT 2012 selfserv_9793 with PID 4318 started at Mon Mar 26 17:52:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4715: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 4318 at Mon Mar 26 17:52:07 EDT 2012 kill -USR1 4318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4318 killed at Mon Mar 26 17:52:07 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4386 >/dev/null 2>/dev/null selfserv_9793 with PID 4386 found at Mon Mar 26 17:52:07 EDT 2012 selfserv_9793 with PID 4386 started at Mon Mar 26 17:52:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4716: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 4386 at Mon Mar 26 17:52:07 EDT 2012 kill -USR1 4386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4386 killed at Mon Mar 26 17:52:07 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:07 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4442 >/dev/null 2>/dev/null selfserv_9793 with PID 4442 found at Mon Mar 26 17:52:07 EDT 2012 selfserv_9793 with PID 4442 started at Mon Mar 26 17:52:07 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4717: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4442 at Mon Mar 26 17:52:07 EDT 2012 kill -USR1 4442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4442 killed at Mon Mar 26 17:52:07 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4498 >/dev/null 2>/dev/null selfserv_9793 with PID 4498 found at Mon Mar 26 17:52:08 EDT 2012 selfserv_9793 with PID 4498 started at Mon Mar 26 17:52:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4718: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 4498 at Mon Mar 26 17:52:08 EDT 2012 kill -USR1 4498 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4498 killed at Mon Mar 26 17:52:08 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4566 >/dev/null 2>/dev/null selfserv_9793 with PID 4566 found at Mon Mar 26 17:52:08 EDT 2012 selfserv_9793 with PID 4566 started at Mon Mar 26 17:52:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4719: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4566 at Mon Mar 26 17:52:08 EDT 2012 kill -USR1 4566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4566 killed at Mon Mar 26 17:52:08 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4622 >/dev/null 2>/dev/null selfserv_9793 with PID 4622 found at Mon Mar 26 17:52:08 EDT 2012 selfserv_9793 with PID 4622 started at Mon Mar 26 17:52:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4720: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4622 at Mon Mar 26 17:52:08 EDT 2012 kill -USR1 4622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4622 killed at Mon Mar 26 17:52:08 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4678 >/dev/null 2>/dev/null selfserv_9793 with PID 4678 found at Mon Mar 26 17:52:08 EDT 2012 selfserv_9793 with PID 4678 started at Mon Mar 26 17:52:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4721: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4678 at Mon Mar 26 17:52:09 EDT 2012 kill -USR1 4678 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4678 killed at Mon Mar 26 17:52:09 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4746 >/dev/null 2>/dev/null selfserv_9793 with PID 4746 found at Mon Mar 26 17:52:09 EDT 2012 selfserv_9793 with PID 4746 started at Mon Mar 26 17:52:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4722: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4746 at Mon Mar 26 17:52:09 EDT 2012 kill -USR1 4746 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4746 killed at Mon Mar 26 17:52:09 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4802 >/dev/null 2>/dev/null selfserv_9793 with PID 4802 found at Mon Mar 26 17:52:09 EDT 2012 selfserv_9793 with PID 4802 started at Mon Mar 26 17:52:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4723: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4802 at Mon Mar 26 17:52:09 EDT 2012 kill -USR1 4802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4802 killed at Mon Mar 26 17:52:09 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4858 >/dev/null 2>/dev/null selfserv_9793 with PID 4858 found at Mon Mar 26 17:52:09 EDT 2012 selfserv_9793 with PID 4858 started at Mon Mar 26 17:52:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4724: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4858 at Mon Mar 26 17:52:09 EDT 2012 kill -USR1 4858 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4858 killed at Mon Mar 26 17:52:09 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4926 >/dev/null 2>/dev/null selfserv_9793 with PID 4926 found at Mon Mar 26 17:52:09 EDT 2012 selfserv_9793 with PID 4926 started at Mon Mar 26 17:52:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4725: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 4926 at Mon Mar 26 17:52:10 EDT 2012 kill -USR1 4926 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4926 killed at Mon Mar 26 17:52:10 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 4982 >/dev/null 2>/dev/null selfserv_9793 with PID 4982 found at Mon Mar 26 17:52:10 EDT 2012 selfserv_9793 with PID 4982 started at Mon Mar 26 17:52:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4726: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 4982 at Mon Mar 26 17:52:10 EDT 2012 kill -USR1 4982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 4982 killed at Mon Mar 26 17:52:10 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5038 >/dev/null 2>/dev/null selfserv_9793 with PID 5038 found at Mon Mar 26 17:52:10 EDT 2012 selfserv_9793 with PID 5038 started at Mon Mar 26 17:52:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4727: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 5038 at Mon Mar 26 17:52:10 EDT 2012 kill -USR1 5038 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5038 killed at Mon Mar 26 17:52:10 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5106 >/dev/null 2>/dev/null selfserv_9793 with PID 5106 found at Mon Mar 26 17:52:10 EDT 2012 selfserv_9793 with PID 5106 started at Mon Mar 26 17:52:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4728: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 5106 at Mon Mar 26 17:52:10 EDT 2012 kill -USR1 5106 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5106 killed at Mon Mar 26 17:52:10 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5162 >/dev/null 2>/dev/null selfserv_9793 with PID 5162 found at Mon Mar 26 17:52:11 EDT 2012 selfserv_9793 with PID 5162 started at Mon Mar 26 17:52:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4729: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 5162 at Mon Mar 26 17:52:11 EDT 2012 kill -USR1 5162 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5162 killed at Mon Mar 26 17:52:11 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5218 >/dev/null 2>/dev/null selfserv_9793 with PID 5218 found at Mon Mar 26 17:52:11 EDT 2012 selfserv_9793 with PID 5218 started at Mon Mar 26 17:52:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4730: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 5218 at Mon Mar 26 17:52:11 EDT 2012 kill -USR1 5218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5218 killed at Mon Mar 26 17:52:11 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5286 >/dev/null 2>/dev/null selfserv_9793 with PID 5286 found at Mon Mar 26 17:52:11 EDT 2012 selfserv_9793 with PID 5286 started at Mon Mar 26 17:52:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4731: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 5286 at Mon Mar 26 17:52:11 EDT 2012 kill -USR1 5286 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5286 killed at Mon Mar 26 17:52:11 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:11 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5342 >/dev/null 2>/dev/null selfserv_9793 with PID 5342 found at Mon Mar 26 17:52:11 EDT 2012 selfserv_9793 with PID 5342 started at Mon Mar 26 17:52:11 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4732: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 5342 at Mon Mar 26 17:52:11 EDT 2012 kill -USR1 5342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5342 killed at Mon Mar 26 17:52:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5398 >/dev/null 2>/dev/null selfserv_9793 with PID 5398 found at Mon Mar 26 17:52:12 EDT 2012 selfserv_9793 with PID 5398 started at Mon Mar 26 17:52:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4733: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 5398 at Mon Mar 26 17:52:12 EDT 2012 kill -USR1 5398 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5398 killed at Mon Mar 26 17:52:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5466 >/dev/null 2>/dev/null selfserv_9793 with PID 5466 found at Mon Mar 26 17:52:12 EDT 2012 selfserv_9793 with PID 5466 started at Mon Mar 26 17:52:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4734: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 5466 at Mon Mar 26 17:52:12 EDT 2012 kill -USR1 5466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5466 killed at Mon Mar 26 17:52:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5522 >/dev/null 2>/dev/null selfserv_9793 with PID 5522 found at Mon Mar 26 17:52:12 EDT 2012 selfserv_9793 with PID 5522 started at Mon Mar 26 17:52:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4735: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5522 at Mon Mar 26 17:52:12 EDT 2012 kill -USR1 5522 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5522 killed at Mon Mar 26 17:52:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:12 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5578 >/dev/null 2>/dev/null selfserv_9793 with PID 5578 found at Mon Mar 26 17:52:12 EDT 2012 selfserv_9793 with PID 5578 started at Mon Mar 26 17:52:12 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4736: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 5578 at Mon Mar 26 17:52:13 EDT 2012 kill -USR1 5578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5578 killed at Mon Mar 26 17:52:13 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5646 >/dev/null 2>/dev/null selfserv_9793 with PID 5646 found at Mon Mar 26 17:52:13 EDT 2012 selfserv_9793 with PID 5646 started at Mon Mar 26 17:52:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4737: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5646 at Mon Mar 26 17:52:13 EDT 2012 kill -USR1 5646 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5646 killed at Mon Mar 26 17:52:13 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5702 >/dev/null 2>/dev/null selfserv_9793 with PID 5702 found at Mon Mar 26 17:52:13 EDT 2012 selfserv_9793 with PID 5702 started at Mon Mar 26 17:52:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4738: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5702 at Mon Mar 26 17:52:13 EDT 2012 kill -USR1 5702 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5702 killed at Mon Mar 26 17:52:13 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:13 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5758 >/dev/null 2>/dev/null selfserv_9793 with PID 5758 found at Mon Mar 26 17:52:13 EDT 2012 selfserv_9793 with PID 5758 started at Mon Mar 26 17:52:13 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4739: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5758 at Mon Mar 26 17:52:14 EDT 2012 kill -USR1 5758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5758 killed at Mon Mar 26 17:52:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5826 >/dev/null 2>/dev/null selfserv_9793 with PID 5826 found at Mon Mar 26 17:52:14 EDT 2012 selfserv_9793 with PID 5826 started at Mon Mar 26 17:52:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4740: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5826 at Mon Mar 26 17:52:14 EDT 2012 kill -USR1 5826 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5826 killed at Mon Mar 26 17:52:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5882 >/dev/null 2>/dev/null selfserv_9793 with PID 5882 found at Mon Mar 26 17:52:14 EDT 2012 selfserv_9793 with PID 5882 started at Mon Mar 26 17:52:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4741: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5882 at Mon Mar 26 17:52:14 EDT 2012 kill -USR1 5882 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5882 killed at Mon Mar 26 17:52:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 5938 >/dev/null 2>/dev/null selfserv_9793 with PID 5938 found at Mon Mar 26 17:52:14 EDT 2012 selfserv_9793 with PID 5938 started at Mon Mar 26 17:52:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4742: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 5938 at Mon Mar 26 17:52:14 EDT 2012 kill -USR1 5938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 5938 killed at Mon Mar 26 17:52:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:14 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:14 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6006 >/dev/null 2>/dev/null selfserv_9793 with PID 6006 found at Mon Mar 26 17:52:14 EDT 2012 selfserv_9793 with PID 6006 started at Mon Mar 26 17:52:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4743: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6006 at Mon Mar 26 17:52:15 EDT 2012 kill -USR1 6006 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6006 killed at Mon Mar 26 17:52:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6062 >/dev/null 2>/dev/null selfserv_9793 with PID 6062 found at Mon Mar 26 17:52:15 EDT 2012 selfserv_9793 with PID 6062 started at Mon Mar 26 17:52:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4744: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 6062 at Mon Mar 26 17:52:15 EDT 2012 kill -USR1 6062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6062 killed at Mon Mar 26 17:52:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6118 >/dev/null 2>/dev/null selfserv_9793 with PID 6118 found at Mon Mar 26 17:52:15 EDT 2012 selfserv_9793 with PID 6118 started at Mon Mar 26 17:52:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4745: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6118 at Mon Mar 26 17:52:15 EDT 2012 kill -USR1 6118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6118 killed at Mon Mar 26 17:52:15 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:15 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6186 >/dev/null 2>/dev/null selfserv_9793 with PID 6186 found at Mon Mar 26 17:52:15 EDT 2012 selfserv_9793 with PID 6186 started at Mon Mar 26 17:52:15 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4746: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6186 at Mon Mar 26 17:52:15 EDT 2012 kill -USR1 6186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6186 killed at Mon Mar 26 17:52:16 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6242 >/dev/null 2>/dev/null selfserv_9793 with PID 6242 found at Mon Mar 26 17:52:16 EDT 2012 selfserv_9793 with PID 6242 started at Mon Mar 26 17:52:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4747: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6242 at Mon Mar 26 17:52:16 EDT 2012 kill -USR1 6242 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6242 killed at Mon Mar 26 17:52:16 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6298 >/dev/null 2>/dev/null selfserv_9793 with PID 6298 found at Mon Mar 26 17:52:16 EDT 2012 selfserv_9793 with PID 6298 started at Mon Mar 26 17:52:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4748: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6298 at Mon Mar 26 17:52:16 EDT 2012 kill -USR1 6298 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6298 killed at Mon Mar 26 17:52:16 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6366 >/dev/null 2>/dev/null selfserv_9793 with PID 6366 found at Mon Mar 26 17:52:16 EDT 2012 selfserv_9793 with PID 6366 started at Mon Mar 26 17:52:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4749: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6366 at Mon Mar 26 17:52:16 EDT 2012 kill -USR1 6366 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6366 killed at Mon Mar 26 17:52:16 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:16 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6422 >/dev/null 2>/dev/null selfserv_9793 with PID 6422 found at Mon Mar 26 17:52:16 EDT 2012 selfserv_9793 with PID 6422 started at Mon Mar 26 17:52:16 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4750: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6422 at Mon Mar 26 17:52:17 EDT 2012 kill -USR1 6422 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6422 killed at Mon Mar 26 17:52:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9793 starting at Mon Mar 26 17:52:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6478 >/dev/null 2>/dev/null selfserv_9793 with PID 6478 found at Mon Mar 26 17:52:17 EDT 2012 selfserv_9793 with PID 6478 started at Mon Mar 26 17:52:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4751: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6478 at Mon Mar 26 17:52:17 EDT 2012 kill -USR1 6478 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6478 killed at Mon Mar 26 17:52:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6549 >/dev/null 2>/dev/null selfserv_9793 with PID 6549 found at Mon Mar 26 17:52:17 EDT 2012 selfserv_9793 with PID 6549 started at Mon Mar 26 17:52:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4752: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6549 at Mon Mar 26 17:52:17 EDT 2012 kill -USR1 6549 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6549 killed at Mon Mar 26 17:52:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6605 >/dev/null 2>/dev/null selfserv_9793 with PID 6605 found at Mon Mar 26 17:52:17 EDT 2012 selfserv_9793 with PID 6605 started at Mon Mar 26 17:52:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4753: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9793 with PID 6605 at Mon Mar 26 17:52:17 EDT 2012 kill -USR1 6605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6605 killed at Mon Mar 26 17:52:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:17 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:17 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6664 >/dev/null 2>/dev/null selfserv_9793 with PID 6664 found at Mon Mar 26 17:52:18 EDT 2012 selfserv_9793 with PID 6664 started at Mon Mar 26 17:52:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4754: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 6664 at Mon Mar 26 17:52:18 EDT 2012 kill -USR1 6664 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6664 killed at Mon Mar 26 17:52:18 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9793 starting at Mon Mar 26 17:52:18 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:18 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:18 EDT 2012 selfserv_9793 with PID 6736 started at Mon Mar 26 17:52:18 EDT 2012 Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:18 EDT 2012 ssl.sh: #4755: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:18 EDT 2012 ssl.sh: #4756: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:18 EDT 2012 ssl.sh: #4757: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:18 EDT 2012 ssl.sh: #4758: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:18 EDT 2012 ssl.sh: #4759: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:19 EDT 2012 ssl.sh: #4760: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:19 EDT 2012 ssl.sh: #4761: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:19 EDT 2012 ssl.sh: #4762: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:19 EDT 2012 ssl.sh: #4763: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:19 EDT 2012 ssl.sh: #4764: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:19 EDT 2012 ssl.sh: #4765: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:19 EDT 2012 ssl.sh: #4766: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:19 EDT 2012 ssl.sh: #4767: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:20 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4768: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:20 EDT 2012 ssl.sh: #4769: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:20 EDT 2012 ssl.sh: #4770: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:20 EDT 2012 ssl.sh: #4771: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:20 EDT 2012 ssl.sh: #4772: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:20 EDT 2012 ssl.sh: #4773: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:20 EDT 2012 ssl.sh: #4774: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:20 EDT 2012 ssl.sh: #4775: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:20 EDT 2012 ssl.sh: #4776: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:21 EDT 2012 ssl.sh: #4777: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:21 EDT 2012 ssl.sh: #4778: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:21 EDT 2012 ssl.sh: #4779: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:21 EDT 2012 ssl.sh: #4780: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:21 EDT 2012 ssl.sh: #4781: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:21 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4782: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:21 EDT 2012 ssl.sh: #4783: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:21 EDT 2012 ssl.sh: #4784: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:21 EDT 2012 ssl.sh: #4785: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:22 EDT 2012 ssl.sh: #4786: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:22 EDT 2012 ssl.sh: #4787: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:22 EDT 2012 ssl.sh: #4788: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:22 EDT 2012 ssl.sh: #4789: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:22 EDT 2012 ssl.sh: #4790: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:22 EDT 2012 ssl.sh: #4791: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:22 EDT 2012 ssl.sh: #4792: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:22 EDT 2012 ssl.sh: #4793: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:23 EDT 2012 ssl.sh: #4794: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6736 >/dev/null 2>/dev/null selfserv_9793 with PID 6736 found at Mon Mar 26 17:52:23 EDT 2012 ssl.sh: #4795: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 6736 at Mon Mar 26 17:52:23 EDT 2012 kill -USR1 6736 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 6736 killed at Mon Mar 26 17:52:23 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:23 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:23 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:23 EDT 2012 selfserv_9793 with PID 8164 started at Mon Mar 26 17:52:23 EDT 2012 Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:23 EDT 2012 ssl.sh: #4796: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:23 EDT 2012 ssl.sh: #4797: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:23 EDT 2012 ssl.sh: #4798: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:23 EDT 2012 ssl.sh: #4799: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:23 EDT 2012 ssl.sh: #4800: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:24 EDT 2012 ssl.sh: #4801: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:24 EDT 2012 ssl.sh: #4802: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:24 EDT 2012 ssl.sh: #4803: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:24 EDT 2012 ssl.sh: #4804: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:24 EDT 2012 ssl.sh: #4805: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:24 EDT 2012 ssl.sh: #4806: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:24 EDT 2012 ssl.sh: #4807: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:24 EDT 2012 ssl.sh: #4808: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:24 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4809: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:25 EDT 2012 ssl.sh: #4810: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:25 EDT 2012 ssl.sh: #4811: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:25 EDT 2012 ssl.sh: #4812: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:25 EDT 2012 ssl.sh: #4813: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:25 EDT 2012 ssl.sh: #4814: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:25 EDT 2012 ssl.sh: #4815: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:25 EDT 2012 ssl.sh: #4816: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:25 EDT 2012 ssl.sh: #4817: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:26 EDT 2012 ssl.sh: #4818: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:26 EDT 2012 ssl.sh: #4819: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:26 EDT 2012 ssl.sh: #4820: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:26 EDT 2012 ssl.sh: #4821: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:26 EDT 2012 ssl.sh: #4822: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:26 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4823: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:26 EDT 2012 ssl.sh: #4824: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:26 EDT 2012 ssl.sh: #4825: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:26 EDT 2012 ssl.sh: #4826: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:27 EDT 2012 ssl.sh: #4827: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:27 EDT 2012 ssl.sh: #4828: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:27 EDT 2012 ssl.sh: #4829: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:27 EDT 2012 ssl.sh: #4830: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:27 EDT 2012 ssl.sh: #4831: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:27 EDT 2012 ssl.sh: #4832: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:27 EDT 2012 ssl.sh: #4833: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:27 EDT 2012 ssl.sh: #4834: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:28 EDT 2012 ssl.sh: #4835: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8164 >/dev/null 2>/dev/null selfserv_9793 with PID 8164 found at Mon Mar 26 17:52:28 EDT 2012 ssl.sh: #4836: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9793 with PID 8164 at Mon Mar 26 17:52:28 EDT 2012 kill -USR1 8164 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 8164 killed at Mon Mar 26 17:52:28 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9587 >/dev/null 2>/dev/null selfserv_9793 with PID 9587 found at Mon Mar 26 17:52:28 EDT 2012 selfserv_9793 with PID 9587 started at Mon Mar 26 17:52:28 EDT 2012 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 9587 at Mon Mar 26 17:52:28 EDT 2012 kill -USR1 9587 ./ssl.sh: line 207: 9587 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9587 killed at Mon Mar 26 17:52:28 EDT 2012 selfserv_9793 starting at Mon Mar 26 17:52:28 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:28 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:28 EDT 2012 selfserv_9793 with PID 9629 started at Mon Mar 26 17:52:28 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:28 EDT 2012 ssl.sh: #4837: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:28 EDT 2012 ssl.sh: #4838: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:28 EDT 2012 ssl.sh: #4839: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:28 EDT 2012 ssl.sh: #4840: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:29 EDT 2012 ssl.sh: #4841: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:29 EDT 2012 ssl.sh: #4842: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:29 EDT 2012 ssl.sh: #4843: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:29 EDT 2012 ssl.sh: #4844: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:29 EDT 2012 ssl.sh: #4845: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:29 EDT 2012 ssl.sh: #4846: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:29 EDT 2012 ssl.sh: #4847: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:29 EDT 2012 ssl.sh: #4848: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:30 EDT 2012 ssl.sh: #4849: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:30 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4850: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:30 EDT 2012 ssl.sh: #4851: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:30 EDT 2012 ssl.sh: #4852: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:30 EDT 2012 ssl.sh: #4853: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:30 EDT 2012 ssl.sh: #4854: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:30 EDT 2012 ssl.sh: #4855: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:30 EDT 2012 ssl.sh: #4856: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:31 EDT 2012 ssl.sh: #4857: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:31 EDT 2012 ssl.sh: #4858: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:31 EDT 2012 ssl.sh: #4859: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:31 EDT 2012 ssl.sh: #4860: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:31 EDT 2012 ssl.sh: #4861: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:31 EDT 2012 ssl.sh: #4862: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:31 EDT 2012 ssl.sh: #4863: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:31 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4864: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:32 EDT 2012 ssl.sh: #4865: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:32 EDT 2012 ssl.sh: #4866: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:32 EDT 2012 ssl.sh: #4867: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:32 EDT 2012 ssl.sh: #4868: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:32 EDT 2012 ssl.sh: #4869: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:32 EDT 2012 ssl.sh: #4870: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:32 EDT 2012 ssl.sh: #4871: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:32 EDT 2012 ssl.sh: #4872: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:33 EDT 2012 ssl.sh: #4873: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:33 EDT 2012 ssl.sh: #4874: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:33 EDT 2012 ssl.sh: #4875: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:33 EDT 2012 ssl.sh: #4876: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9629 >/dev/null 2>/dev/null selfserv_9793 with PID 9629 found at Mon Mar 26 17:52:33 EDT 2012 ssl.sh: #4877: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 9629 at Mon Mar 26 17:52:33 EDT 2012 kill -USR1 9629 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 9629 killed at Mon Mar 26 17:52:33 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:33 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:33 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:33 EDT 2012 selfserv_9793 with PID 11073 started at Mon Mar 26 17:52:33 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:33 EDT 2012 ssl.sh: #4878: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:33 EDT 2012 ssl.sh: #4879: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:34 EDT 2012 ssl.sh: #4880: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:34 EDT 2012 ssl.sh: #4881: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:34 EDT 2012 ssl.sh: #4882: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:34 EDT 2012 ssl.sh: #4883: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:34 EDT 2012 ssl.sh: #4884: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:34 EDT 2012 ssl.sh: #4885: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:34 EDT 2012 ssl.sh: #4886: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:34 EDT 2012 ssl.sh: #4887: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:35 EDT 2012 ssl.sh: #4888: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:35 EDT 2012 ssl.sh: #4889: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:35 EDT 2012 ssl.sh: #4890: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:35 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4891: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:35 EDT 2012 ssl.sh: #4892: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:35 EDT 2012 ssl.sh: #4893: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:35 EDT 2012 ssl.sh: #4894: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:35 EDT 2012 ssl.sh: #4895: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:36 EDT 2012 ssl.sh: #4896: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:36 EDT 2012 ssl.sh: #4897: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:36 EDT 2012 ssl.sh: #4898: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:36 EDT 2012 ssl.sh: #4899: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:36 EDT 2012 ssl.sh: #4900: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:36 EDT 2012 ssl.sh: #4901: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:36 EDT 2012 ssl.sh: #4902: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:36 EDT 2012 ssl.sh: #4903: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:37 EDT 2012 ssl.sh: #4904: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:37 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4905: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:37 EDT 2012 ssl.sh: #4906: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:37 EDT 2012 ssl.sh: #4907: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:37 EDT 2012 ssl.sh: #4908: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:37 EDT 2012 ssl.sh: #4909: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:37 EDT 2012 ssl.sh: #4910: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:37 EDT 2012 ssl.sh: #4911: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:38 EDT 2012 ssl.sh: #4912: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:38 EDT 2012 ssl.sh: #4913: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:38 EDT 2012 ssl.sh: #4914: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:38 EDT 2012 ssl.sh: #4915: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:38 EDT 2012 ssl.sh: #4916: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:38 EDT 2012 ssl.sh: #4917: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11073 >/dev/null 2>/dev/null selfserv_9793 with PID 11073 found at Mon Mar 26 17:52:38 EDT 2012 ssl.sh: #4918: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 11073 at Mon Mar 26 17:52:38 EDT 2012 kill -USR1 11073 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 11073 killed at Mon Mar 26 17:52:38 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:38 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:38 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12494 >/dev/null 2>/dev/null selfserv_9793 with PID 12494 found at Mon Mar 26 17:52:38 EDT 2012 selfserv_9793 with PID 12494 started at Mon Mar 26 17:52:38 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 12494 at Mon Mar 26 17:52:38 EDT 2012 kill -USR1 12494 ./ssl.sh: line 207: 12494 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12494 killed at Mon Mar 26 17:52:38 EDT 2012 selfserv_9793 starting at Mon Mar 26 17:52:38 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:38 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:39 EDT 2012 selfserv_9793 with PID 12536 started at Mon Mar 26 17:52:39 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:39 EDT 2012 ssl.sh: #4919: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:39 EDT 2012 ssl.sh: #4920: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:39 EDT 2012 ssl.sh: #4921: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:39 EDT 2012 ssl.sh: #4922: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:39 EDT 2012 ssl.sh: #4923: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:39 EDT 2012 ssl.sh: #4924: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:39 EDT 2012 ssl.sh: #4925: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:40 EDT 2012 ssl.sh: #4926: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:40 EDT 2012 ssl.sh: #4927: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:40 EDT 2012 ssl.sh: #4928: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:40 EDT 2012 ssl.sh: #4929: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:40 EDT 2012 ssl.sh: #4930: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:40 EDT 2012 ssl.sh: #4931: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:40 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4932: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:40 EDT 2012 ssl.sh: #4933: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:41 EDT 2012 ssl.sh: #4934: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:41 EDT 2012 ssl.sh: #4935: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:41 EDT 2012 ssl.sh: #4936: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:41 EDT 2012 ssl.sh: #4937: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:41 EDT 2012 ssl.sh: #4938: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:41 EDT 2012 ssl.sh: #4939: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:41 EDT 2012 ssl.sh: #4940: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:41 EDT 2012 ssl.sh: #4941: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:42 EDT 2012 ssl.sh: #4942: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:42 EDT 2012 ssl.sh: #4943: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:42 EDT 2012 ssl.sh: #4944: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:42 EDT 2012 ssl.sh: #4945: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:42 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4946: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:42 EDT 2012 ssl.sh: #4947: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:42 EDT 2012 ssl.sh: #4948: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:42 EDT 2012 ssl.sh: #4949: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:42 EDT 2012 ssl.sh: #4950: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:43 EDT 2012 ssl.sh: #4951: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:43 EDT 2012 ssl.sh: #4952: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:43 EDT 2012 ssl.sh: #4953: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:43 EDT 2012 ssl.sh: #4954: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:43 EDT 2012 ssl.sh: #4955: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:43 EDT 2012 ssl.sh: #4956: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:43 EDT 2012 ssl.sh: #4957: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:44 EDT 2012 ssl.sh: #4958: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12536 >/dev/null 2>/dev/null selfserv_9793 with PID 12536 found at Mon Mar 26 17:52:44 EDT 2012 ssl.sh: #4959: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 12536 at Mon Mar 26 17:52:44 EDT 2012 kill -USR1 12536 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 12536 killed at Mon Mar 26 17:52:44 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:44 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:44 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:44 EDT 2012 selfserv_9793 with PID 13956 started at Mon Mar 26 17:52:44 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:44 EDT 2012 ssl.sh: #4960: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:44 EDT 2012 ssl.sh: #4961: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:44 EDT 2012 ssl.sh: #4962: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:44 EDT 2012 ssl.sh: #4963: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:44 EDT 2012 ssl.sh: #4964: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:44 EDT 2012 ssl.sh: #4965: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:45 EDT 2012 ssl.sh: #4966: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:45 EDT 2012 ssl.sh: #4967: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:45 EDT 2012 ssl.sh: #4968: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:45 EDT 2012 ssl.sh: #4969: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:45 EDT 2012 ssl.sh: #4970: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:45 EDT 2012 ssl.sh: #4971: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:45 EDT 2012 ssl.sh: #4972: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:45 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4973: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:46 EDT 2012 ssl.sh: #4974: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:46 EDT 2012 ssl.sh: #4975: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:46 EDT 2012 ssl.sh: #4976: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:46 EDT 2012 ssl.sh: #4977: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:46 EDT 2012 ssl.sh: #4978: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:46 EDT 2012 ssl.sh: #4979: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:46 EDT 2012 ssl.sh: #4980: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:46 EDT 2012 ssl.sh: #4981: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:47 EDT 2012 ssl.sh: #4982: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:47 EDT 2012 ssl.sh: #4983: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:47 EDT 2012 ssl.sh: #4984: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:47 EDT 2012 ssl.sh: #4985: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:47 EDT 2012 ssl.sh: #4986: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:47 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4987: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:47 EDT 2012 ssl.sh: #4988: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:47 EDT 2012 ssl.sh: #4989: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:48 EDT 2012 ssl.sh: #4990: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:48 EDT 2012 ssl.sh: #4991: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:48 EDT 2012 ssl.sh: #4992: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:48 EDT 2012 ssl.sh: #4993: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:48 EDT 2012 ssl.sh: #4994: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:48 EDT 2012 ssl.sh: #4995: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:48 EDT 2012 ssl.sh: #4996: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:48 EDT 2012 ssl.sh: #4997: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:49 EDT 2012 ssl.sh: #4998: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:49 EDT 2012 ssl.sh: #4999: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9793 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13956 >/dev/null 2>/dev/null selfserv_9793 with PID 13956 found at Mon Mar 26 17:52:49 EDT 2012 ssl.sh: #5000: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9793 with PID 13956 at Mon Mar 26 17:52:49 EDT 2012 kill -USR1 13956 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 13956 killed at Mon Mar 26 17:52:49 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15391 >/dev/null 2>/dev/null selfserv_9793 with PID 15391 found at Mon Mar 26 17:52:49 EDT 2012 selfserv_9793 with PID 15391 started at Mon Mar 26 17:52:49 EDT 2012 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9793 with PID 15391 at Mon Mar 26 17:52:49 EDT 2012 kill -USR1 15391 ./ssl.sh: line 207: 15391 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9793 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15391 killed at Mon Mar 26 17:52:49 EDT 2012 ssl.sh: SSL Stress Test - server bypass/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:52:49 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:49 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15742 >/dev/null 2>/dev/null selfserv_9793 with PID 15742 found at Mon Mar 26 17:52:49 EDT 2012 selfserv_9793 with PID 15742 started at Mon Mar 26 17:52:49 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:49 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:52:50 EDT 2012 ssl.sh: #5001: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 15742 at Mon Mar 26 17:52:50 EDT 2012 kill -USR1 15742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15742 killed at Mon Mar 26 17:52:50 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:52:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15819 >/dev/null 2>/dev/null selfserv_9793 with PID 15819 found at Mon Mar 26 17:52:50 EDT 2012 selfserv_9793 with PID 15819 started at Mon Mar 26 17:52:50 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:50 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:52:50 EDT 2012 ssl.sh: #5002: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 15819 at Mon Mar 26 17:52:50 EDT 2012 kill -USR1 15819 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15819 killed at Mon Mar 26 17:52:50 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:52:50 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:50 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15895 >/dev/null 2>/dev/null selfserv_9793 with PID 15895 found at Mon Mar 26 17:52:51 EDT 2012 selfserv_9793 with PID 15895 started at Mon Mar 26 17:52:51 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:52:51 EDT 2012 ssl.sh: #5003: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 15895 at Mon Mar 26 17:52:51 EDT 2012 kill -USR1 15895 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15895 killed at Mon Mar 26 17:52:51 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:52:51 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:51 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 15973 >/dev/null 2>/dev/null selfserv_9793 with PID 15973 found at Mon Mar 26 17:52:51 EDT 2012 selfserv_9793 with PID 15973 started at Mon Mar 26 17:52:51 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:52:52 EDT 2012 ssl.sh: #5004: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 15973 at Mon Mar 26 17:52:52 EDT 2012 kill -USR1 15973 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 15973 killed at Mon Mar 26 17:52:52 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:52:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16049 >/dev/null 2>/dev/null selfserv_9793 with PID 16049 found at Mon Mar 26 17:52:52 EDT 2012 selfserv_9793 with PID 16049 started at Mon Mar 26 17:52:52 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:52 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:52:52 EDT 2012 ssl.sh: #5005: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16049 at Mon Mar 26 17:52:52 EDT 2012 kill -USR1 16049 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16049 killed at Mon Mar 26 17:52:52 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:52:52 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:52 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16125 >/dev/null 2>/dev/null selfserv_9793 with PID 16125 found at Mon Mar 26 17:52:52 EDT 2012 selfserv_9793 with PID 16125 started at Mon Mar 26 17:52:52 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:52 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:52:53 EDT 2012 ssl.sh: #5006: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16125 at Mon Mar 26 17:52:53 EDT 2012 kill -USR1 16125 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16125 killed at Mon Mar 26 17:52:53 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:52:53 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:53 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16201 >/dev/null 2>/dev/null selfserv_9793 with PID 16201 found at Mon Mar 26 17:52:53 EDT 2012 selfserv_9793 with PID 16201 started at Mon Mar 26 17:52:53 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:52:54 EDT 2012 ssl.sh: #5007: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16201 at Mon Mar 26 17:52:54 EDT 2012 kill -USR1 16201 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16201 killed at Mon Mar 26 17:52:54 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:52:54 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:54 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16277 >/dev/null 2>/dev/null selfserv_9793 with PID 16277 found at Mon Mar 26 17:52:54 EDT 2012 selfserv_9793 with PID 16277 started at Mon Mar 26 17:52:54 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:52:55 EDT 2012 ssl.sh: #5008: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16277 at Mon Mar 26 17:52:55 EDT 2012 kill -USR1 16277 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16277 killed at Mon Mar 26 17:52:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9793 starting at Mon Mar 26 17:52:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16359 >/dev/null 2>/dev/null selfserv_9793 with PID 16359 found at Mon Mar 26 17:52:55 EDT 2012 selfserv_9793 with PID 16359 started at Mon Mar 26 17:52:55 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:52:55 EDT 2012 ssl.sh: #5009: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16359 at Mon Mar 26 17:52:55 EDT 2012 kill -USR1 16359 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16359 killed at Mon Mar 26 17:52:55 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:55 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:55 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16456 >/dev/null 2>/dev/null selfserv_9793 with PID 16456 found at Mon Mar 26 17:52:55 EDT 2012 selfserv_9793 with PID 16456 started at Mon Mar 26 17:52:55 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:52:56 EDT 2012 ssl.sh: #5010: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16456 at Mon Mar 26 17:52:56 EDT 2012 kill -USR1 16456 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16456 killed at Mon Mar 26 17:52:56 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:56 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:56 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16531 >/dev/null 2>/dev/null selfserv_9793 with PID 16531 found at Mon Mar 26 17:52:56 EDT 2012 selfserv_9793 with PID 16531 started at Mon Mar 26 17:52:56 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:52:57 EDT 2012 ssl.sh: #5011: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16531 at Mon Mar 26 17:52:57 EDT 2012 kill -USR1 16531 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16531 killed at Mon Mar 26 17:52:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:57 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:57 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16606 >/dev/null 2>/dev/null selfserv_9793 with PID 16606 found at Mon Mar 26 17:52:57 EDT 2012 selfserv_9793 with PID 16606 started at Mon Mar 26 17:52:57 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:52:58 EDT 2012 ssl.sh: #5012: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16606 at Mon Mar 26 17:52:58 EDT 2012 kill -USR1 16606 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16606 killed at Mon Mar 26 17:52:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16681 >/dev/null 2>/dev/null selfserv_9793 with PID 16681 found at Mon Mar 26 17:52:58 EDT 2012 selfserv_9793 with PID 16681 started at Mon Mar 26 17:52:58 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:52:58 EDT 2012 ssl.sh: #5013: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16681 at Mon Mar 26 17:52:58 EDT 2012 kill -USR1 16681 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16681 killed at Mon Mar 26 17:52:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16757 >/dev/null 2>/dev/null selfserv_9793 with PID 16757 found at Mon Mar 26 17:52:58 EDT 2012 selfserv_9793 with PID 16757 started at Mon Mar 26 17:52:58 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:52:58 EDT 2012 ssl.sh: #5014: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16757 at Mon Mar 26 17:52:58 EDT 2012 kill -USR1 16757 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16757 killed at Mon Mar 26 17:52:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:52:58 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:58 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16833 >/dev/null 2>/dev/null selfserv_9793 with PID 16833 found at Mon Mar 26 17:52:59 EDT 2012 selfserv_9793 with PID 16833 started at Mon Mar 26 17:52:59 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:59 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:52:59 EDT 2012 ssl.sh: #5015: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16833 at Mon Mar 26 17:52:59 EDT 2012 kill -USR1 16833 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16833 killed at Mon Mar 26 17:52:59 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:52:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16909 >/dev/null 2>/dev/null selfserv_9793 with PID 16909 found at Mon Mar 26 17:52:59 EDT 2012 selfserv_9793 with PID 16909 started at Mon Mar 26 17:52:59 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:59 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:52:59 EDT 2012 ssl.sh: #5016: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16909 at Mon Mar 26 17:52:59 EDT 2012 kill -USR1 16909 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16909 killed at Mon Mar 26 17:52:59 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:52:59 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:52:59 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 16985 >/dev/null 2>/dev/null selfserv_9793 with PID 16985 found at Mon Mar 26 17:52:59 EDT 2012 selfserv_9793 with PID 16985 started at Mon Mar 26 17:52:59 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:52:59 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:52:59 EDT 2012 ssl.sh: #5017: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 16985 at Mon Mar 26 17:52:59 EDT 2012 kill -USR1 16985 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 16985 killed at Mon Mar 26 17:53:00 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9793 starting at Mon Mar 26 17:53:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17067 >/dev/null 2>/dev/null selfserv_9793 with PID 17067 found at Mon Mar 26 17:53:00 EDT 2012 selfserv_9793 with PID 17067 started at Mon Mar 26 17:53:00 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:00 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:53:00 EDT 2012 ssl.sh: #5018: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17067 at Mon Mar 26 17:53:00 EDT 2012 kill -USR1 17067 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17067 killed at Mon Mar 26 17:53:00 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9793 starting at Mon Mar 26 17:53:00 EDT 2012 selfserv_9793 -D -p 9793 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:00 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17149 >/dev/null 2>/dev/null selfserv_9793 with PID 17149 found at Mon Mar 26 17:53:00 EDT 2012 selfserv_9793 with PID 17149 started at Mon Mar 26 17:53:00 EDT 2012 strsclnt -q -p 9793 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:00 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:53:01 EDT 2012 ssl.sh: #5019: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17149 at Mon Mar 26 17:53:01 EDT 2012 kill -USR1 17149 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17149 killed at Mon Mar 26 17:53:01 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:53:01 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:01 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17606 >/dev/null 2>/dev/null selfserv_9793 with PID 17606 found at Mon Mar 26 17:53:01 EDT 2012 selfserv_9793 with PID 17606 started at Mon Mar 26 17:53:01 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:01 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:53:02 EDT 2012 ssl.sh: #5020: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17606 at Mon Mar 26 17:53:02 EDT 2012 kill -USR1 17606 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17606 killed at Mon Mar 26 17:53:02 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9793 starting at Mon Mar 26 17:53:02 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:02 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17682 >/dev/null 2>/dev/null selfserv_9793 with PID 17682 found at Mon Mar 26 17:53:02 EDT 2012 selfserv_9793 with PID 17682 started at Mon Mar 26 17:53:02 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:02 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:53:02 EDT 2012 ssl.sh: #5021: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17682 at Mon Mar 26 17:53:02 EDT 2012 kill -USR1 17682 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17682 killed at Mon Mar 26 17:53:02 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9793 starting at Mon Mar 26 17:53:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17758 >/dev/null 2>/dev/null selfserv_9793 with PID 17758 found at Mon Mar 26 17:53:03 EDT 2012 selfserv_9793 with PID 17758 started at Mon Mar 26 17:53:03 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:03 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:53:03 EDT 2012 ssl.sh: #5022: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17758 at Mon Mar 26 17:53:03 EDT 2012 kill -USR1 17758 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17758 killed at Mon Mar 26 17:53:03 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9793 starting at Mon Mar 26 17:53:03 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:03 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17834 >/dev/null 2>/dev/null selfserv_9793 with PID 17834 found at Mon Mar 26 17:53:03 EDT 2012 selfserv_9793 with PID 17834 started at Mon Mar 26 17:53:03 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:03 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:53:04 EDT 2012 ssl.sh: #5023: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17834 at Mon Mar 26 17:53:04 EDT 2012 kill -USR1 17834 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17834 killed at Mon Mar 26 17:53:04 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9793 starting at Mon Mar 26 17:53:04 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:04 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17910 >/dev/null 2>/dev/null selfserv_9793 with PID 17910 found at Mon Mar 26 17:53:04 EDT 2012 selfserv_9793 with PID 17910 started at Mon Mar 26 17:53:04 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:04 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:53:05 EDT 2012 ssl.sh: #5024: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17910 at Mon Mar 26 17:53:05 EDT 2012 kill -USR1 17910 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17910 killed at Mon Mar 26 17:53:05 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9793 starting at Mon Mar 26 17:53:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 17986 >/dev/null 2>/dev/null selfserv_9793 with PID 17986 found at Mon Mar 26 17:53:05 EDT 2012 selfserv_9793 with PID 17986 started at Mon Mar 26 17:53:05 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:05 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:53:05 EDT 2012 ssl.sh: #5025: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 17986 at Mon Mar 26 17:53:05 EDT 2012 kill -USR1 17986 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 17986 killed at Mon Mar 26 17:53:05 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9793 starting at Mon Mar 26 17:53:05 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:05 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18062 >/dev/null 2>/dev/null selfserv_9793 with PID 18062 found at Mon Mar 26 17:53:06 EDT 2012 selfserv_9793 with PID 18062 started at Mon Mar 26 17:53:06 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:06 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:53:06 EDT 2012 ssl.sh: #5026: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18062 at Mon Mar 26 17:53:06 EDT 2012 kill -USR1 18062 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18062 killed at Mon Mar 26 17:53:06 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:53:06 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:06 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18167 >/dev/null 2>/dev/null selfserv_9793 with PID 18167 found at Mon Mar 26 17:53:06 EDT 2012 selfserv_9793 with PID 18167 started at Mon Mar 26 17:53:06 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:06 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:53:07 EDT 2012 ssl.sh: #5027: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18167 at Mon Mar 26 17:53:08 EDT 2012 kill -USR1 18167 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18167 killed at Mon Mar 26 17:53:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:53:08 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:08 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18242 >/dev/null 2>/dev/null selfserv_9793 with PID 18242 found at Mon Mar 26 17:53:08 EDT 2012 selfserv_9793 with PID 18242 started at Mon Mar 26 17:53:08 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:53:09 EDT 2012 ssl.sh: #5028: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18242 at Mon Mar 26 17:53:09 EDT 2012 kill -USR1 18242 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18242 killed at Mon Mar 26 17:53:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:53:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18317 >/dev/null 2>/dev/null selfserv_9793 with PID 18317 found at Mon Mar 26 17:53:09 EDT 2012 selfserv_9793 with PID 18317 started at Mon Mar 26 17:53:09 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:53:09 EDT 2012 ssl.sh: #5029: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18317 at Mon Mar 26 17:53:09 EDT 2012 kill -USR1 18317 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18317 killed at Mon Mar 26 17:53:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:53:09 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:09 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18393 >/dev/null 2>/dev/null selfserv_9793 with PID 18393 found at Mon Mar 26 17:53:09 EDT 2012 selfserv_9793 with PID 18393 started at Mon Mar 26 17:53:09 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:53:09 EDT 2012 ssl.sh: #5030: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18393 at Mon Mar 26 17:53:10 EDT 2012 kill -USR1 18393 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18393 killed at Mon Mar 26 17:53:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:53:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18469 >/dev/null 2>/dev/null selfserv_9793 with PID 18469 found at Mon Mar 26 17:53:10 EDT 2012 selfserv_9793 with PID 18469 started at Mon Mar 26 17:53:10 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:53:10 EDT 2012 ssl.sh: #5031: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18469 at Mon Mar 26 17:53:10 EDT 2012 kill -USR1 18469 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18469 killed at Mon Mar 26 17:53:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9793 starting at Mon Mar 26 17:53:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18545 >/dev/null 2>/dev/null selfserv_9793 with PID 18545 found at Mon Mar 26 17:53:10 EDT 2012 selfserv_9793 with PID 18545 started at Mon Mar 26 17:53:10 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:53:10 EDT 2012 ssl.sh: #5032: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18545 at Mon Mar 26 17:53:10 EDT 2012 kill -USR1 18545 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18545 killed at Mon Mar 26 17:53:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9793 starting at Mon Mar 26 17:53:10 EDT 2012 selfserv_9793 -D -p 9793 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18664 & trying to connect to selfserv_9793 at Mon Mar 26 17:53:10 EDT 2012 tstclnt -p 9793 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9793 (address=127.0.0.1) kill -0 18621 >/dev/null 2>/dev/null selfserv_9793 with PID 18621 found at Mon Mar 26 17:53:10 EDT 2012 selfserv_9793 with PID 18621 started at Mon Mar 26 17:53:10 EDT 2012 strsclnt -q -p 9793 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:53:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:53:11 EDT 2012 ssl.sh: #5033: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9793 with PID 18621 at Mon Mar 26 17:53:11 EDT 2012 kill -USR1 18621 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9793 -b -p 9793 2>/dev/null; selfserv_9793 with PID 18621 killed at Mon Mar 26 17:53:11 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) TIMESTAMP ssl END: Mon Mar 26 17:53:11 EDT 2012 Running tests for merge TIMESTAMP merge BEGIN: Mon Mar 26 17:53:11 EDT 2012 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v1.18664 -t "Test1" sdr.sh: #5034: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v2.18664 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #5035: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.18664 -t "1234567" sdr.sh: #5036: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v1.18664 -t "Test1" sdr.sh: #5037: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v2.18664 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #5038: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.18664 -t "1234567" sdr.sh: #5039: Decrypt - Value 3 - PASSED merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.18664 -t Test2 -f ../tests.pw merge.sh: #5040: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5041: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5042: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5043: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5044: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5045: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:51:03 2012 Not After : Sun Mar 26 21:51:03 2017 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:91:06:23:71:32:20:68:65:8e:2e:ce:be:15:90:ba: e3:58:79:ed:10:56:17:1b:c9:3f:1e:64:05:b1:93:ab: d1:f4:89:5d:94:6d:2c:46:be:f9:3f:7f:cf:94:d4:c5: 5e:ba:bc:06:dc:07:cc:ef:39:c4:09:07:9d:fb:e1:60: f0:36:b9:04:f9:0a:e5:c4:9f:ab:a9:2f:64:f2:0b:54: 8d:b2:9d:80:b0:07:af:57:dc:be:68:f5:9d:31:b0:d9: 45:76:76:84:ef:f8:71:d3:9d:55:5e:2e:92:fc:0f:b9: a3:d6:12:50:e6:53:42:b5:5d:c1:29:b7:ff:a0:eb:85 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 81:90:bd:d9:16:69:68:43:cb:43:50:8a:93:05:18:b7: 5f:6c:1d:56:e0:6c:e3:13:4b:a9:c5:cb:d7:e0:9f:ec: ea:95:fa:73:4d:48:0d:11:1e:a4:dc:75:83:36:37:a9: 7c:0d:e2:79:03:15:42:a2:fd:f2:cb:0c:af:7b:89:36: 3f:09:dd:08:36:c9:29:c1:09:d8:e6:d4:26:52:50:16: 6e:65:03:36:5c:25:ae:a7:89:9b:94:e0:2b:3d:17:8e: ac:9c:78:a8:17:7f:6e:75:fd:bf:93:93:15:11:c1:6e: 0f:28:13:81:c2:2f:f7:1c:ac:3f:22:7e:1a:f7:21:28 Fingerprint (MD5): 8E:D9:C4:73:4C:5F:4C:F9:51:9A:5E:19:76:BC:85:16 Fingerprint (SHA1): BD:F3:E6:E9:41:56:87:CC:11:25:6E:6B:A3:43:95:6A:87:DD:7B:29 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #5046: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:51:03 2012 Not After : Sun Mar 26 21:51:03 2017 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:96:13:6f:bf:73:cd:72:3a:50:2f:82:cc:bd:b0:67: df:b9:c0:b0:e7:f9:0a:40:88:da:b5:70:78:8e:cc:c9: fc:f2:29:02:bc:b3:d0:72:93:fb:79:70:fe:61:41:e5: b7:59:01:27:e9:63:b6:cd:89:8f:08:52:7d:d6:bc:a0: 0c:51:f2:0a:c7:ec:c9:e4:94:94:09:09:b4:55:93:25: e4:67:61:af:53:dd:15:5c:27:4c:fe:61:4b:7d:99:80: 43:56:91:92:8c:b8:48:05:1e:41:e8:43:1d:b0:b3:37: 35:d1:cc:b4:ae:9b:14:f7:6c:f0:38:84:0e:00:8d:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 86:51:b4:fc:36:b2:c9:59:7a:c2:3d:66:c5:c1:53:b3: a8:33:36:5c:89:0c:8e:a4:23:e0:be:f6:eb:26:93:15: cf:3a:3a:01:f5:8b:f9:bc:2b:0f:73:8e:b4:94:bc:77: 6a:a8:c9:9c:71:cf:c4:0e:ef:bf:3a:5e:f0:67:1f:b0: 58:fc:16:1b:7e:66:a9:2a:70:77:35:0a:b5:73:73:20: 28:c6:27:90:44:ef:dd:e6:17:1c:4e:69:1c:7c:d5:12: 37:22:6f:fa:94:78:ea:90:15:fb:6a:9f:53:cb:71:50: c0:92:b0:c3:6d:08:54:55:dc:24:e8:84:d9:54:5e:27 Fingerprint (MD5): 0E:3D:DC:15:BA:F5:13:70:7F:09:A1:96:26:4E:A4:98 Fingerprint (SHA1): B1:4F:47:A1:9A:EA:6E:20:75:69:12:90:EF:F9:7F:3F:DA:1A:76:72 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #5047: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5048: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C Alice u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, localhost.localdomain u,u,u localhost-sni.localdomain u,u,u ExtendedSSLUser u,u,u serverCA C,C,C clientCA T,C,C chain-1-clientCA ,, chain-2-clientCA ,, Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.18664 -t Test2 -f ../tests.pw merge.sh: #5049: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v1.18664 -t Test1 -f ../tests.pw merge.sh: #5050: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #5051: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #5052: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #5053: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Mar 26 21:51:12 2012 Entry (1): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:50:22 2012 Entry Extensions: Name: CRL reason code Entry (2): Serial Number: 42 (0x2a) Revocation Date: Mon Mar 26 21:51:10 2012 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #5054: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Mon Mar 26 17:53:17 EDT 2012 Running tests for chains TIMESTAMP chains BEGIN: Mon Mar 26 17:53:17 EDT 2012 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5055: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175318 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5056: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5057: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5058: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175319 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5059: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5060: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5061: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5062: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326175320 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5063: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #5064: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326175321 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5065: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #5066: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5067: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5068: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5069: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 326175322 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5070: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der chains.sh: #5071: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5072: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #5073: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #5074: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175319 (0x13710a57) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:53:19 2012 Not After : Sun Mar 26 21:53:19 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:73:b1:65:00:8f:0b:38:a3:49:83:04:2e:13:22:26: 52:82:7e:29:61:6d:fc:87:e3:b8:b6:25:7e:47:6e:19: fb:41:43:48:1f:c0:47:9c:b3:2a:06:26:e9:bb:f1:b1: 51:44:f1:26:99:ba:a1:86:2f:e1:3e:c7:39:1f:31:d5: 9e:38:cd:98:9c:34:5e:ee:e7:dc:c9:a9:03:9c:1e:e6: b1:80:1a:ec:20:d8:69:43:83:5a:40:f5:d0:c5:3d:ae: e3:a9:8e:51:e3:4b:d1:6d:47:a8:23:9c:f5:58:bc:23: e6:d7:34:f7:1a:e8:8c:e1:7b:e7:7a:73:c7:2c:b8:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5a:d1:5c:49:f1:ff:2e:3f:aa:8a:40:e3:df:ad:63:71: 26:61:75:b1:17:be:30:9d:a6:a2:59:d1:07:12:89:1c: d8:30:7c:0c:04:7c:54:2e:3d:3c:ae:ec:a4:33:1e:9b: 93:9d:06:28:e6:56:d2:8e:86:bc:c3:eb:e0:ec:0c:5b: c4:eb:62:10:ae:23:db:f7:b5:d0:71:48:23:30:19:c3: 63:74:ac:59:3e:a3:88:43:91:04:f7:13:ff:86:fc:38: 68:07:63:89:ab:29:fa:cf:6c:40:1a:56:8d:e5:67:24: 79:0e:c2:9a:69:e2:9f:b2:95:71:d3:8d:06:e5:f5:f4 Fingerprint (MD5): 5C:32:66:CB:65:57:7B:96:7D:5C:05:5D:24:4C:53:C0 Fingerprint (SHA1): 94:27:3E:F7:FF:50:89:3A:9A:2F:C3:83:AB:D2:44:57:1D:05:E0:B9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5075: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175318 (0x13710a56) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:53:18 2012 Not After : Sun Mar 26 21:53:18 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:15:76:39:3d:54:dc:fe:08:ef:1b:0f:cc:5a:c1:09: 8c:02:17:e5:a2:84:0b:8c:01:50:ae:6a:48:ea:b6:c3: f0:b6:6c:e0:11:52:25:49:b4:2c:42:41:2d:be:af:05: 38:a5:1a:bc:79:6b:20:e7:da:a0:8c:ea:1b:6b:29:20: 60:27:46:f1:7d:75:af:44:c8:e7:72:45:67:f7:3b:40: 65:06:11:ed:63:84:a8:81:b7:85:9f:f3:e9:9d:78:18: 4b:d5:a4:56:bf:07:e6:84:e4:a5:13:72:cc:6f:db:2a: 4a:43:64:a4:71:26:56:fd:9b:db:95:3b:c0:ab:72:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2c:45:10:1c:bd:f9:40:09:f6:8f:bb:36:c3:4b:b2:53: 75:40:92:34:27:c4:18:89:47:0d:67:fe:58:48:52:41: ea:7a:a7:92:6c:ab:f3:0d:ea:af:9e:82:06:70:a5:0f: df:5d:6b:90:b8:13:f4:8c:06:75:88:3c:a7:f6:31:c6: 76:d0:74:46:43:86:6f:44:c6:1b:93:1c:92:31:1a:3e: 13:9d:ee:cc:28:77:7b:4c:06:ed:79:4d:22:5a:91:9f: 6b:83:73:ca:9f:7d:5c:36:39:89:98:e5:b4:f3:a2:89: 37:48:ba:65:00:0f:1d:9b:b4:2b:d5:d1:21:6d:16:45 Fingerprint (MD5): F6:3E:01:79:E5:21:91:B1:CC:62:D0:19:B4:E3:D1:1E Fingerprint (SHA1): FB:8F:02:3F:C7:7D:85:A9:9E:FC:9A:4E:F8:0A:F0:E5:AF:A6:61:71 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5076: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5077: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #5078: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #5079: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175318 (0x13710a56) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:53:18 2012 Not After : Sun Mar 26 21:53:18 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:15:76:39:3d:54:dc:fe:08:ef:1b:0f:cc:5a:c1:09: 8c:02:17:e5:a2:84:0b:8c:01:50:ae:6a:48:ea:b6:c3: f0:b6:6c:e0:11:52:25:49:b4:2c:42:41:2d:be:af:05: 38:a5:1a:bc:79:6b:20:e7:da:a0:8c:ea:1b:6b:29:20: 60:27:46:f1:7d:75:af:44:c8:e7:72:45:67:f7:3b:40: 65:06:11:ed:63:84:a8:81:b7:85:9f:f3:e9:9d:78:18: 4b:d5:a4:56:bf:07:e6:84:e4:a5:13:72:cc:6f:db:2a: 4a:43:64:a4:71:26:56:fd:9b:db:95:3b:c0:ab:72:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2c:45:10:1c:bd:f9:40:09:f6:8f:bb:36:c3:4b:b2:53: 75:40:92:34:27:c4:18:89:47:0d:67:fe:58:48:52:41: ea:7a:a7:92:6c:ab:f3:0d:ea:af:9e:82:06:70:a5:0f: df:5d:6b:90:b8:13:f4:8c:06:75:88:3c:a7:f6:31:c6: 76:d0:74:46:43:86:6f:44:c6:1b:93:1c:92:31:1a:3e: 13:9d:ee:cc:28:77:7b:4c:06:ed:79:4d:22:5a:91:9f: 6b:83:73:ca:9f:7d:5c:36:39:89:98:e5:b4:f3:a2:89: 37:48:ba:65:00:0f:1d:9b:b4:2b:d5:d1:21:6d:16:45 Fingerprint (MD5): F6:3E:01:79:E5:21:91:B1:CC:62:D0:19:B4:E3:D1:1E Fingerprint (SHA1): FB:8F:02:3F:C7:7D:85:A9:9E:FC:9A:4E:F8:0A:F0:E5:AF:A6:61:71 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5080: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175319 (0x13710a57) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:53:19 2012 Not After : Sun Mar 26 21:53:19 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:73:b1:65:00:8f:0b:38:a3:49:83:04:2e:13:22:26: 52:82:7e:29:61:6d:fc:87:e3:b8:b6:25:7e:47:6e:19: fb:41:43:48:1f:c0:47:9c:b3:2a:06:26:e9:bb:f1:b1: 51:44:f1:26:99:ba:a1:86:2f:e1:3e:c7:39:1f:31:d5: 9e:38:cd:98:9c:34:5e:ee:e7:dc:c9:a9:03:9c:1e:e6: b1:80:1a:ec:20:d8:69:43:83:5a:40:f5:d0:c5:3d:ae: e3:a9:8e:51:e3:4b:d1:6d:47:a8:23:9c:f5:58:bc:23: e6:d7:34:f7:1a:e8:8c:e1:7b:e7:7a:73:c7:2c:b8:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5a:d1:5c:49:f1:ff:2e:3f:aa:8a:40:e3:df:ad:63:71: 26:61:75:b1:17:be:30:9d:a6:a2:59:d1:07:12:89:1c: d8:30:7c:0c:04:7c:54:2e:3d:3c:ae:ec:a4:33:1e:9b: 93:9d:06:28:e6:56:d2:8e:86:bc:c3:eb:e0:ec:0c:5b: c4:eb:62:10:ae:23:db:f7:b5:d0:71:48:23:30:19:c3: 63:74:ac:59:3e:a3:88:43:91:04:f7:13:ff:86:fc:38: 68:07:63:89:ab:29:fa:cf:6c:40:1a:56:8d:e5:67:24: 79:0e:c2:9a:69:e2:9f:b2:95:71:d3:8d:06:e5:f5:f4 Fingerprint (MD5): 5C:32:66:CB:65:57:7B:96:7D:5C:05:5D:24:4C:53:C0 Fingerprint (SHA1): 94:27:3E:F7:FF:50:89:3A:9A:2F:C3:83:AB:D2:44:57:1D:05:E0:B9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5081: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #5082: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #5083: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5084: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5085: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5086: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175319 (0x13710a57) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:53:19 2012 Not After : Sun Mar 26 21:53:19 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:73:b1:65:00:8f:0b:38:a3:49:83:04:2e:13:22:26: 52:82:7e:29:61:6d:fc:87:e3:b8:b6:25:7e:47:6e:19: fb:41:43:48:1f:c0:47:9c:b3:2a:06:26:e9:bb:f1:b1: 51:44:f1:26:99:ba:a1:86:2f:e1:3e:c7:39:1f:31:d5: 9e:38:cd:98:9c:34:5e:ee:e7:dc:c9:a9:03:9c:1e:e6: b1:80:1a:ec:20:d8:69:43:83:5a:40:f5:d0:c5:3d:ae: e3:a9:8e:51:e3:4b:d1:6d:47:a8:23:9c:f5:58:bc:23: e6:d7:34:f7:1a:e8:8c:e1:7b:e7:7a:73:c7:2c:b8:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5a:d1:5c:49:f1:ff:2e:3f:aa:8a:40:e3:df:ad:63:71: 26:61:75:b1:17:be:30:9d:a6:a2:59:d1:07:12:89:1c: d8:30:7c:0c:04:7c:54:2e:3d:3c:ae:ec:a4:33:1e:9b: 93:9d:06:28:e6:56:d2:8e:86:bc:c3:eb:e0:ec:0c:5b: c4:eb:62:10:ae:23:db:f7:b5:d0:71:48:23:30:19:c3: 63:74:ac:59:3e:a3:88:43:91:04:f7:13:ff:86:fc:38: 68:07:63:89:ab:29:fa:cf:6c:40:1a:56:8d:e5:67:24: 79:0e:c2:9a:69:e2:9f:b2:95:71:d3:8d:06:e5:f5:f4 Fingerprint (MD5): 5C:32:66:CB:65:57:7B:96:7D:5C:05:5D:24:4C:53:C0 Fingerprint (SHA1): 94:27:3E:F7:FF:50:89:3A:9A:2F:C3:83:AB:D2:44:57:1D:05:E0:B9 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5087: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175319 (0x13710a57) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:53:19 2012 Not After : Sun Mar 26 21:53:19 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:73:b1:65:00:8f:0b:38:a3:49:83:04:2e:13:22:26: 52:82:7e:29:61:6d:fc:87:e3:b8:b6:25:7e:47:6e:19: fb:41:43:48:1f:c0:47:9c:b3:2a:06:26:e9:bb:f1:b1: 51:44:f1:26:99:ba:a1:86:2f:e1:3e:c7:39:1f:31:d5: 9e:38:cd:98:9c:34:5e:ee:e7:dc:c9:a9:03:9c:1e:e6: b1:80:1a:ec:20:d8:69:43:83:5a:40:f5:d0:c5:3d:ae: e3:a9:8e:51:e3:4b:d1:6d:47:a8:23:9c:f5:58:bc:23: e6:d7:34:f7:1a:e8:8c:e1:7b:e7:7a:73:c7:2c:b8:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5a:d1:5c:49:f1:ff:2e:3f:aa:8a:40:e3:df:ad:63:71: 26:61:75:b1:17:be:30:9d:a6:a2:59:d1:07:12:89:1c: d8:30:7c:0c:04:7c:54:2e:3d:3c:ae:ec:a4:33:1e:9b: 93:9d:06:28:e6:56:d2:8e:86:bc:c3:eb:e0:ec:0c:5b: c4:eb:62:10:ae:23:db:f7:b5:d0:71:48:23:30:19:c3: 63:74:ac:59:3e:a3:88:43:91:04:f7:13:ff:86:fc:38: 68:07:63:89:ab:29:fa:cf:6c:40:1a:56:8d:e5:67:24: 79:0e:c2:9a:69:e2:9f:b2:95:71:d3:8d:06:e5:f5:f4 Fingerprint (MD5): 5C:32:66:CB:65:57:7B:96:7D:5C:05:5D:24:4C:53:C0 Fingerprint (SHA1): 94:27:3E:F7:FF:50:89:3A:9A:2F:C3:83:AB:D2:44:57:1D:05:E0:B9 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5088: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #5089: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #5090: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5091: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5092: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5093: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175318 (0x13710a56) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:53:18 2012 Not After : Sun Mar 26 21:53:18 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:15:76:39:3d:54:dc:fe:08:ef:1b:0f:cc:5a:c1:09: 8c:02:17:e5:a2:84:0b:8c:01:50:ae:6a:48:ea:b6:c3: f0:b6:6c:e0:11:52:25:49:b4:2c:42:41:2d:be:af:05: 38:a5:1a:bc:79:6b:20:e7:da:a0:8c:ea:1b:6b:29:20: 60:27:46:f1:7d:75:af:44:c8:e7:72:45:67:f7:3b:40: 65:06:11:ed:63:84:a8:81:b7:85:9f:f3:e9:9d:78:18: 4b:d5:a4:56:bf:07:e6:84:e4:a5:13:72:cc:6f:db:2a: 4a:43:64:a4:71:26:56:fd:9b:db:95:3b:c0:ab:72:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2c:45:10:1c:bd:f9:40:09:f6:8f:bb:36:c3:4b:b2:53: 75:40:92:34:27:c4:18:89:47:0d:67:fe:58:48:52:41: ea:7a:a7:92:6c:ab:f3:0d:ea:af:9e:82:06:70:a5:0f: df:5d:6b:90:b8:13:f4:8c:06:75:88:3c:a7:f6:31:c6: 76:d0:74:46:43:86:6f:44:c6:1b:93:1c:92:31:1a:3e: 13:9d:ee:cc:28:77:7b:4c:06:ed:79:4d:22:5a:91:9f: 6b:83:73:ca:9f:7d:5c:36:39:89:98:e5:b4:f3:a2:89: 37:48:ba:65:00:0f:1d:9b:b4:2b:d5:d1:21:6d:16:45 Fingerprint (MD5): F6:3E:01:79:E5:21:91:B1:CC:62:D0:19:B4:E3:D1:1E Fingerprint (SHA1): FB:8F:02:3F:C7:7D:85:A9:9E:FC:9A:4E:F8:0A:F0:E5:AF:A6:61:71 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5094: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175318 (0x13710a56) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:53:18 2012 Not After : Sun Mar 26 21:53:18 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:15:76:39:3d:54:dc:fe:08:ef:1b:0f:cc:5a:c1:09: 8c:02:17:e5:a2:84:0b:8c:01:50:ae:6a:48:ea:b6:c3: f0:b6:6c:e0:11:52:25:49:b4:2c:42:41:2d:be:af:05: 38:a5:1a:bc:79:6b:20:e7:da:a0:8c:ea:1b:6b:29:20: 60:27:46:f1:7d:75:af:44:c8:e7:72:45:67:f7:3b:40: 65:06:11:ed:63:84:a8:81:b7:85:9f:f3:e9:9d:78:18: 4b:d5:a4:56:bf:07:e6:84:e4:a5:13:72:cc:6f:db:2a: 4a:43:64:a4:71:26:56:fd:9b:db:95:3b:c0:ab:72:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2c:45:10:1c:bd:f9:40:09:f6:8f:bb:36:c3:4b:b2:53: 75:40:92:34:27:c4:18:89:47:0d:67:fe:58:48:52:41: ea:7a:a7:92:6c:ab:f3:0d:ea:af:9e:82:06:70:a5:0f: df:5d:6b:90:b8:13:f4:8c:06:75:88:3c:a7:f6:31:c6: 76:d0:74:46:43:86:6f:44:c6:1b:93:1c:92:31:1a:3e: 13:9d:ee:cc:28:77:7b:4c:06:ed:79:4d:22:5a:91:9f: 6b:83:73:ca:9f:7d:5c:36:39:89:98:e5:b4:f3:a2:89: 37:48:ba:65:00:0f:1d:9b:b4:2b:d5:d1:21:6d:16:45 Fingerprint (MD5): F6:3E:01:79:E5:21:91:B1:CC:62:D0:19:B4:E3:D1:1E Fingerprint (SHA1): FB:8F:02:3F:C7:7D:85:A9:9E:FC:9A:4E:F8:0A:F0:E5:AF:A6:61:71 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5095: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #5096: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175323 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5097: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #5098: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #5099: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175324 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5100: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #5101: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #5102: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175325 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5103: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #5104: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #5105: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175326 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5106: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #5107: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #5108: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175327 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5109: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #5110: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #5111: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175328 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5112: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #5113: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #5114: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175329 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5115: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #5116: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #5117: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175330 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5118: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #5119: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #5120: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175331 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5121: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #5122: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #5123: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5124: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 326175332 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5125: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der chains.sh: #5126: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 326175333 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5127: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der chains.sh: #5128: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 326175334 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5129: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der chains.sh: #5130: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #5131: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #5132: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5133: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 326175335 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5134: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der chains.sh: #5135: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 326175336 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5136: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der chains.sh: #5137: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 326175337 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5138: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der chains.sh: #5139: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #5140: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #5141: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5142: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 326175338 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5143: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der chains.sh: #5144: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 326175339 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5145: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der chains.sh: #5146: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 326175340 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5147: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der chains.sh: #5148: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #5149: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #5150: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5151: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 326175341 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5152: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der chains.sh: #5153: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 326175342 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5154: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der chains.sh: #5155: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 326175343 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5156: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der chains.sh: #5157: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #5158: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5159: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5160: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 326175344 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5161: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der chains.sh: #5162: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5163: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5164: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326175345 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5165: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5166: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175323 (0x13710a5b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 26 21:53:26 2012 Not After : Sun Mar 26 21:53:26 2062 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:14:8f:71:cf:1a:57:7f:ba:bd:19:b4:1c:de:31:c6: c3:0d:14:82:d8:de:46:f5:ce:7f:78:66:ed:3d:7b:d7: 86:df:76:ba:39:a4:49:0b:c4:63:14:12:58:97:cd:f8: ea:66:c9:69:de:c8:e1:d3:e7:9f:8c:6e:31:f6:e3:58: a1:c1:04:80:4e:ba:22:77:ac:71:20:a6:88:10:3c:99: 55:38:57:e5:cc:d2:99:a8:1f:6f:62:c5:0e:a8:00:a8: 8b:89:35:b8:a8:71:4e:f8:a5:10:55:d6:e0:0e:3c:6b: e3:f5:b3:3e:83:14:00:50:19:9e:ce:b4:6b:19:56:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3c:d3:a3:b0:68:58:7e:83:d5:15:94:e1:eb:33:16:d4: 29:63:15:36:52:71:26:ad:fd:c5:a3:bc:d8:b6:68:c0: ca:d4:2c:b6:c3:1c:41:07:11:1c:87:03:75:80:30:38: a9:2c:7d:36:8e:ce:d7:e3:a2:2e:4b:72:aa:52:e4:cc: d4:5e:29:aa:43:0e:4f:62:53:ad:1b:f0:fd:65:a2:19: 02:51:82:24:7c:72:fc:fd:b0:67:98:63:92:36:b3:43: 78:85:1c:23:62:ce:08:1a:f3:c8:64:f0:e3:04:62:53: 49:6a:70:8a:c9:55:39:07:ac:8c:7e:5e:ad:94:20:62 Fingerprint (MD5): 70:57:D9:C1:E7:B8:DC:40:98:BB:F6:BF:5D:66:60:8D Fingerprint (SHA1): EB:6E:7D:3F:92:1C:9A:82:9A:19:76:F9:72:55:6A:45:27:92:58:FE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5167: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175324 (0x13710a5c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 26 21:53:27 2012 Not After : Sun Mar 26 21:53:27 2062 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:20:da:a1:0f:58:0d:36:54:68:29:23:50:bc:96:00: 38:38:7d:a9:2a:16:d7:91:99:6b:04:ec:95:c8:c9:77: 9c:ab:4a:48:a6:b6:dc:01:e7:35:b9:9c:ca:fc:6b:8a: 07:5a:4a:6a:42:c3:69:9e:63:e8:18:66:fb:9e:c2:20: 1e:48:2b:a4:07:55:c6:3a:e7:22:d1:19:6d:12:bf:29: 9a:91:c8:c3:9c:ae:77:e3:4a:84:e3:d3:19:e8:7f:87: 65:8a:be:2d:71:2b:67:3b:8f:df:e2:3c:a9:a1:6f:29: 49:ff:ff:5d:4c:03:7f:4a:3f:b8:23:e7:10:d6:ea:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 83:79:b5:94:7f:8a:49:33:9f:fd:e8:2a:b5:e8:ce:18: 87:b8:b7:2a:0f:cc:b0:f7:55:09:ac:ce:26:93:c5:9f: 3c:79:49:c9:e1:25:8f:b8:dd:eb:84:d2:94:71:39:27: 7d:bf:81:38:c9:ed:9a:8d:81:bd:a4:14:43:66:4d:43: df:7c:bd:4b:ca:bf:72:f1:c8:b8:f3:17:fd:9a:7e:4a: fb:e1:2a:e7:d7:26:f0:f8:3a:27:7b:b5:cc:bd:df:22: 3b:d5:1f:f0:58:2a:c5:df:61:3a:82:a0:9f:5d:76:4a: 9b:b8:f8:a2:15:ec:28:d5:60:24:23:c3:15:3b:46:43 Fingerprint (MD5): 26:F0:F9:0F:48:46:39:33:FC:EC:F4:23:31:15:38:48 Fingerprint (SHA1): 45:11:5D:46:8F:72:0B:AC:90:45:95:48:C5:75:43:F1:B0:46:5B:7B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5168: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175325 (0x13710a5d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 26 21:53:28 2012 Not After : Sun Mar 26 21:53:28 2062 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:ae:ed:e2:af:eb:33:e9:bd:47:97:60:fb:9a:58:fe: ad:45:34:2f:b7:f9:c4:fe:fa:96:fe:af:3f:03:bb:44: 6e:7e:5c:92:b1:84:f0:e2:12:52:df:11:59:b2:aa:a9: 53:27:73:88:e0:0b:da:7c:49:8f:62:44:7d:c5:a1:76: 34:49:5c:94:e5:15:6b:03:dd:d1:b7:1b:ca:cc:08:4d: 23:7c:40:61:42:11:22:01:2e:2e:cc:97:d1:06:ea:9b: ce:66:43:7a:11:15:b3:25:c3:79:c8:6f:2f:b0:b6:08: fa:8a:8c:e7:03:a5:43:ec:f6:97:f1:a5:32:af:39:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:ad:a0:72:35:ab:c1:22:b3:6d:d3:23:08:91:89:c9: 1b:a4:ee:17:d2:f3:39:bf:6b:f3:d1:7c:2c:b0:7d:32: 84:0a:1d:0b:da:79:67:e6:94:c6:4b:34:76:02:c2:7c: 0f:22:82:47:10:4b:c9:85:29:9a:81:0b:2f:58:37:d8: 8f:8d:44:f2:d1:5e:07:43:e0:40:b5:a6:16:cc:02:15: 2e:51:b2:b5:7b:9c:05:96:c5:ea:a1:62:68:22:dc:db: 94:d2:39:77:60:0b:10:e0:d9:05:54:53:16:7e:6f:53: 26:ae:5f:46:4f:89:0d:8b:ae:54:e0:67:8a:13:7c:c5 Fingerprint (MD5): D0:EC:83:DA:04:04:F2:13:9A:F0:A7:BE:8D:3F:BF:8B Fingerprint (SHA1): E3:06:60:7B:9E:66:3E:1A:02:59:BA:C0:67:C8:06:92:A0:78:2A:5F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5169: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175326 (0x13710a5e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 26 21:53:29 2012 Not After : Sun Mar 26 21:53:29 2062 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:96:c8:70:39:82:b9:d6:ff:d4:2c:e2:ae:54:45:69: 48:73:9a:be:33:27:e6:28:86:eb:83:e4:2b:2a:a0:ca: 9f:48:09:f9:aa:a8:d7:d4:db:c0:89:ed:da:81:b3:29: 36:ea:a6:b5:6b:dd:aa:94:80:b8:bc:66:8a:5e:94:1c: 21:59:9f:f2:67:f1:32:19:fe:22:28:30:b2:d3:6d:92: fe:78:b8:ce:ae:49:cb:3f:0c:8c:33:03:03:ed:4c:f1: b9:f9:44:af:bf:aa:8c:c1:0c:25:26:f7:2a:d5:ee:f9: 24:18:09:35:65:e8:b2:92:97:5a:47:86:51:e3:9f:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 23:1d:05:94:1c:02:ae:21:4c:06:e5:55:8a:8b:e9:f0: c4:61:7d:d2:6a:47:11:a7:07:19:85:19:d2:fd:49:95: dc:a9:8c:76:d3:98:26:18:c6:76:41:29:62:b7:9f:14: fb:80:5c:d4:e3:ac:68:7b:c3:8b:40:69:dc:a0:1b:76: 91:b6:ab:f4:d1:0d:78:45:af:ba:cc:6f:99:58:22:04: 78:da:b1:7c:e2:91:d1:c6:a3:0f:c0:fd:6c:44:90:0f: 3b:09:20:6e:c5:4b:4d:c8:96:fb:10:00:a1:38:dc:93: 21:6b:a9:f4:a3:0f:13:9b:d6:e5:86:ab:57:b2:bb:6d Fingerprint (MD5): 81:8E:63:B1:9E:14:AB:C6:A7:81:A2:25:13:07:19:7A Fingerprint (SHA1): BD:2C:10:15:77:0A:C3:40:A2:DD:BF:49:4B:B6:8A:8C:74:6F:D9:19 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5170: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175327 (0x13710a5f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 26 21:53:30 2012 Not After : Sun Mar 26 21:53:30 2062 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:bc:c1:97:1d:17:37:5e:e3:9e:c2:29:94:b9:0f:25: bc:18:a9:00:51:3d:55:32:ff:01:88:d9:17:00:af:e2: 4d:5b:d3:ee:b6:40:4a:b6:47:d0:5a:d1:0d:7c:f4:2d: da:8b:dd:95:e4:1e:32:5f:c5:05:75:75:f2:29:aa:f7: 33:13:8c:1e:eb:fb:49:3f:b0:9b:4d:60:23:6c:45:2c: bb:73:e9:3b:13:8c:6f:96:4d:40:d1:44:91:c6:b2:dd: 77:c3:3e:26:ff:e1:b5:6d:0f:00:d2:70:b8:af:b7:fd: 0e:5e:2b:c0:f3:ef:fb:3f:92:e2:a3:92:18:a1:71:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:8f:bb:31:69:68:82:f0:bb:2f:f3:8f:72:be:ce:7e: fb:8c:19:c1:e2:96:9e:10:94:3e:43:33:86:2b:d6:7b: 1f:39:e4:9f:69:66:87:7c:ac:27:37:b4:82:96:8d:82: 4c:50:73:15:d1:69:5a:9c:40:b9:ea:2c:73:fa:87:23: e3:4a:06:c9:61:0e:2b:df:6d:2f:14:9d:d2:0f:8f:96: 5e:4f:39:49:d5:35:9f:09:11:00:e2:58:bb:be:10:d9: 3a:30:ab:8a:40:3d:22:a1:b2:a7:18:84:06:a8:fe:ec: 5e:75:ce:21:0b:9d:17:17:1a:50:de:1a:cb:86:d3:3e Fingerprint (MD5): 46:7E:AD:50:33:9A:5D:04:D3:1D:76:1C:B0:E7:DD:82 Fingerprint (SHA1): 9D:F1:CE:12:49:DA:31:0C:4D:03:72:B3:C3:2F:F5:CF:1C:B7:C9:03 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5171: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175328 (0x13710a60) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 26 21:53:31 2012 Not After : Sun Mar 26 21:53:31 2062 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:41:7b:4b:d0:3d:aa:37:dc:b2:d9:89:29:c7:0c:f6: a8:32:e6:36:ff:1f:42:9e:67:42:04:1f:37:5c:ba:06: d6:0d:ab:11:60:64:e1:06:6b:88:bb:32:ae:66:69:84: ea:27:8f:a3:6f:7a:e4:af:b2:d4:a4:e4:91:00:24:c5: 32:be:cc:6e:ce:33:2c:43:f8:7c:07:4b:8f:c5:20:7b: 3b:97:c7:0a:d5:f7:55:42:42:cd:4c:52:79:81:5b:1e: 69:dc:2d:6f:00:d5:93:9c:f3:da:ce:5e:cb:8c:01:4b: 7f:83:40:0f:42:75:74:48:26:1c:3c:ce:15:cb:f0:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8e:7d:f0:5b:c6:ba:40:07:0d:76:25:6e:6b:97:42:df: fd:26:6e:91:66:11:db:5f:58:14:b2:cd:4b:6e:28:3a: ac:8f:39:c0:99:20:fb:e2:46:d1:c5:f6:8b:8a:94:0e: d1:23:43:98:dd:cf:fc:d8:d6:cd:c8:8d:fe:29:4a:18: ac:c5:11:ec:4f:67:51:3d:40:dd:43:c2:77:2c:c7:cb: 6a:73:8d:6d:0f:d7:8c:b3:8e:c0:a2:04:70:7a:84:e6: b9:93:38:73:98:1d:49:eb:f6:97:b3:18:17:0c:21:2d: 45:4c:2e:50:8a:24:05:dc:77:1f:89:46:17:a9:ed:32 Fingerprint (MD5): 2B:B2:D8:76:0A:A2:2F:12:C1:D3:69:06:19:BE:24:AE Fingerprint (SHA1): 76:70:13:6B:BC:7C:AA:72:5B:A8:8C:70:A7:C4:7D:AC:E4:0F:CA:38 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5172: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175329 (0x13710a61) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 26 21:53:32 2012 Not After : Sun Mar 26 21:53:32 2062 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:72:e9:2d:7a:35:7a:92:78:ce:87:ca:e8:98:74:f8: 51:9d:28:c6:70:53:36:00:df:c2:a0:f6:94:e2:a0:28: 88:20:d9:19:e1:06:2e:da:b3:46:7a:0f:87:e4:35:ff: a8:c6:02:bc:e6:22:45:25:e5:61:c3:7d:ed:45:8a:e5: d1:f3:4b:c3:5c:f4:2a:6c:ec:e9:22:67:48:36:f2:60: 46:f2:ba:25:f5:77:f7:e5:4d:81:47:16:fb:5c:86:8e: 82:12:1a:ea:2a:2e:0a:64:fd:a7:ec:ab:c5:c4:35:0c: 21:01:23:a8:8a:f2:15:9d:e5:1a:f7:21:6b:6d:84:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 57:ff:54:95:11:1a:0a:52:f6:33:b1:87:21:36:62:b8: 82:95:ea:c2:6d:c9:c7:e2:f2:ff:c0:b0:b7:b3:b8:28: 2d:0a:6c:b5:d4:2f:ab:6d:9c:fa:f3:a8:06:d7:ce:aa: 6c:52:25:48:83:ac:7f:21:2f:f3:c7:7c:55:39:57:5a: 6b:c9:32:a2:72:5a:ab:75:ff:0d:b4:bb:c0:6a:56:ca: 27:db:d2:8b:f0:6b:fa:17:6c:9f:83:b1:f8:0b:51:62: 12:f0:08:48:fd:7f:d6:dc:d2:be:9e:9d:4a:2a:3c:3f: 10:95:3d:ca:b2:ba:64:da:17:3b:73:c5:99:41:4a:7e Fingerprint (MD5): 12:35:CF:4B:E1:97:71:B1:79:63:E5:58:0B:B2:4C:09 Fingerprint (SHA1): 2B:BF:94:35:4F:8D:69:AD:D9:05:6F:82:FA:BF:9E:C8:8C:E7:26:E4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5173: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175330 (0x13710a62) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 26 21:53:33 2012 Not After : Sun Mar 26 21:53:33 2062 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:45:ce:1e:c5:60:29:61:2b:fc:cd:20:d3:7b:fc:12: 36:71:b0:b2:3d:c7:3e:f8:36:11:db:77:81:60:74:28: d7:22:67:7b:f6:63:10:91:07:49:40:3c:d1:e7:af:de: ec:79:98:e5:49:ce:bc:79:a6:63:f0:b6:af:d3:d6:3e: f0:36:b8:ef:66:c0:10:e5:7f:ac:6e:2e:3a:88:01:0c: a4:29:62:af:ef:31:d4:6d:7c:90:df:83:cc:2b:a7:56: 5c:da:4e:2c:4e:f9:bf:cd:da:ac:a0:46:e5:f4:14:78: cb:97:78:d5:4e:29:49:f6:7c:00:be:3b:22:40:d1:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7c:90:00:31:8b:22:55:94:c8:1e:e7:8f:e8:6a:cd:16: be:61:ce:21:6f:3e:09:4c:8a:6a:47:76:b6:75:76:11: f4:90:9e:09:70:35:9b:6d:55:a6:36:cf:c9:43:04:a6: e3:e0:a1:1c:53:a8:e3:56:eb:bb:13:78:f1:15:66:07: 94:ba:07:3d:f7:47:21:24:68:41:e6:1d:e4:fe:97:a9: 14:ed:0a:c5:18:4b:80:39:ac:b2:dc:d7:0b:c2:47:c5: d0:4b:ef:1f:65:c2:8d:24:d6:af:7a:69:b7:a2:de:e5: 87:00:5f:66:0a:0b:79:d0:30:c1:b1:10:86:0e:66:41 Fingerprint (MD5): 6C:28:C3:CB:0F:C6:50:02:F5:74:90:4E:86:74:6D:4E Fingerprint (SHA1): 6A:A1:68:EB:92:9F:E5:D2:7F:F5:F1:37:E6:52:75:F0:F2:8B:14:79 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5174: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175331 (0x13710a63) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 26 21:53:34 2012 Not After : Sun Mar 26 21:53:34 2062 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:4a:f8:3a:28:99:08:03:41:83:a6:8c:f2:b5:4e:1c: dc:08:9f:7b:f2:8f:35:7e:2a:35:5b:c2:f8:f0:9c:ca: ab:eb:f3:5c:2d:c4:09:d1:67:aa:10:02:c0:e0:d5:66: 96:29:ab:1d:f7:ea:9e:11:ad:0a:77:6c:02:17:58:3c: fa:ee:f7:87:20:6e:03:dd:cb:22:5e:4e:6a:47:6f:2c: 1c:24:2a:40:3d:b5:92:28:db:0d:4a:92:0f:df:5e:da: a7:fa:d8:f8:09:38:e8:02:f5:26:a2:9b:96:7d:e0:ca: 55:5d:58:02:53:9a:c2:8a:f1:bd:cc:ac:4c:e2:5b:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2e:32:3d:be:0d:dc:02:22:81:9e:d9:74:81:9f:01:cf: 66:3a:79:dd:5d:d3:63:26:fc:67:0b:a5:30:04:f2:56: 99:92:9f:24:5e:10:0d:36:18:bc:7b:5f:48:fb:3e:56: e2:6d:eb:cb:6f:99:4a:29:b5:a9:31:1c:76:81:e5:a5: 55:36:e2:e4:a8:d6:70:66:ee:bc:c9:ee:53:a9:ec:85: 50:ac:30:de:74:42:c5:0d:cf:f8:cb:6e:1c:e8:92:23: 36:f5:5e:cd:2a:30:4c:c7:76:09:ea:2d:0e:fc:78:6b: 27:5a:c0:73:e8:a1:8f:b5:62:39:24:9c:8c:39:17:78 Fingerprint (MD5): 21:6A:C8:D1:A4:0B:05:BF:55:72:96:B4:27:88:0C:A0 Fingerprint (SHA1): F0:7A:AB:14:35:57:73:39:5C:92:54:E4:55:95:E4:E8:67:F6:5C:BC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5175: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5176: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175346 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5177: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5178: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5179: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5180: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175347 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5181: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5182: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5183: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5184: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326175348 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5185: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5186: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5187: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5188: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326175349 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5189: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #5190: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5191: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175346 (0x13710a72) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:44 2012 Not After : Sun Mar 26 21:53:44 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:3e:4b:0e:2d:c1:43:72:2e:e0:07:dc:49:1a:a6:67: 07:7f:62:58:9e:aa:89:ae:24:74:9b:2a:04:10:3b:83: 94:97:76:10:ce:16:53:c5:46:6b:49:18:fd:85:88:af: cb:64:34:75:99:c5:b1:d3:d4:da:bf:84:44:21:07:d1: 52:cd:89:44:5e:34:5b:75:81:ec:55:ab:d2:8d:a6:af: 2d:07:47:82:f7:7c:3c:84:38:12:cb:df:be:3a:45:cc: 89:41:95:6a:72:0e:63:50:b0:6d:f3:2c:24:79:7f:a9: a4:92:3f:0d:ee:c4:81:59:75:b6:fe:12:6f:4a:a5:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4c:c9:81:a8:d2:d2:c1:7a:5f:79:b4:3f:81:e2:5b:fd: 6a:32:ee:a4:e6:1a:9d:59:e0:ef:3f:52:4b:67:ff:83: 43:6f:72:88:88:2f:3e:cc:3b:c1:7d:1c:7c:0b:c7:d4: 7b:7a:0b:11:e3:80:17:24:2d:a0:22:79:45:e4:72:4a: e2:bf:69:be:0f:f6:c8:79:64:30:54:a8:0a:af:70:1e: 33:a6:bf:39:40:8d:a2:d2:91:2c:21:33:70:43:0c:34: ac:23:cc:61:64:21:31:58:ee:8b:f4:38:87:6e:3f:1b: bb:27:6b:95:70:fb:d7:c3:96:ed:b3:cf:5f:b0:ee:73 Fingerprint (MD5): 79:B8:0A:A9:EB:78:A1:18:F9:84:1C:34:44:69:99:25 Fingerprint (SHA1): 54:0B:D7:D7:03:9F:7B:B0:02:5F:C6:71:7E:82:B0:45:74:42:E1:BB Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5192: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5193: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175347 (0x13710a73) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:45 2012 Not After : Sun Mar 26 21:53:45 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:db:3b:eb:8c:46:d9:1a:2c:58:f0:6f:18:be:93:c1: 1d:2e:88:3b:1a:51:42:d6:45:89:7b:7f:e5:10:01:5e: d2:9d:54:aa:03:b7:d6:05:8d:5f:44:be:d5:2a:0c:2a: 99:28:c7:15:a2:7b:3c:82:6a:2d:db:e9:d0:a8:ac:3e: ef:5b:9f:a6:89:0d:91:94:b6:e3:fe:94:be:ca:1d:2f: 6a:3b:09:aa:59:d2:27:82:a0:ef:29:f6:32:c3:69:0f: a2:3e:03:a1:80:97:22:7b:93:3c:eb:a9:1c:84:6c:97: c0:16:6d:5f:2b:01:12:8a:1e:90:6d:2a:9b:3e:2c:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2a:f8:97:2f:3c:82:65:a9:62:c7:a7:14:07:72:b2:6f: 01:fd:e4:1a:7f:4d:82:f4:73:54:f3:c7:e0:73:30:7a: 60:86:1f:5c:0e:ce:a1:2e:22:d3:f9:07:41:bb:44:78: b6:b8:94:18:6f:40:f9:b3:44:c3:5b:b2:cd:b0:fc:28: 60:3a:04:b8:9e:52:5e:aa:a9:f7:21:c7:72:92:32:52: d8:73:26:35:af:c5:50:4b:b6:02:9e:d1:5a:5e:93:d5: e3:7a:42:92:0b:a4:8e:b7:54:28:0d:a7:89:ad:86:d2: 4b:f8:1f:91:af:a6:7a:83:d7:c3:ad:41:a6:41:13:e1 Fingerprint (MD5): 9E:2E:DD:E1:F4:91:25:CF:1F:6D:D4:64:F1:80:BC:0A Fingerprint (SHA1): 2F:DB:96:A2:AF:D7:3D:0C:DB:03:C3:9D:E4:4F:3D:A5:20:A6:2B:2B Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5194: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5195: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175348 (0x13710a74) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:53:46 2012 Not After : Sun Mar 26 21:53:46 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:6d:1e:14:b9:25:f4:d9:8c:72:8d:a8:1e:d2:2e:27: b9:85:2d:f8:7d:5c:d3:c4:3d:8a:2d:bc:4a:e2:3e:54: 04:f6:89:6b:ed:cf:f9:d4:6a:2e:8b:be:76:ed:f0:72: 71:bc:17:71:f1:63:ad:b9:83:b6:e9:ba:4c:a3:c7:0d: 88:02:dd:a6:d4:e9:d7:db:02:58:a4:9c:ec:75:4c:34: f6:60:06:51:2c:4f:c9:d2:32:07:25:d5:f9:a5:1f:be: 91:d6:1e:f9:6f:3a:6a:3c:6e:32:75:47:5b:bb:33:63: 15:bc:95:d2:f4:76:0c:68:12:06:2e:85:45:94:6e:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:fc:3b:25:81:2f:98:a0:68:a7:d7:b5:f5:9c:f2:21: 2a:7a:b2:da:50:c6:e6:20:db:f3:75:7f:50:a5:cd:c9: 92:a5:c4:1a:57:1f:7c:ba:c7:4c:84:d7:11:aa:a0:7d: d8:bd:90:1d:4f:bc:95:7d:36:31:81:4a:7c:1b:18:32: e3:0c:7a:51:73:71:9f:0c:87:72:2f:e3:47:cb:92:0c: 15:43:4d:3a:3f:6e:dd:12:15:e4:43:13:e5:11:f0:ef: 25:23:46:8c:02:c7:ea:8c:48:73:76:b0:84:3b:30:99: b9:64:b8:3b:34:4e:8c:44:37:84:db:37:6e:72:7b:57 Fingerprint (MD5): E7:65:C3:38:74:0E:67:55:1A:AC:E5:E2:73:94:D1:E7 Fingerprint (SHA1): EE:9B:32:66:F0:89:B9:FE:55:55:E0:FB:A8:ED:D3:90:ED:61:1A:6E Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5196: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5197: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5198: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5199: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5200: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175346 (0x13710a72) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:44 2012 Not After : Sun Mar 26 21:53:44 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:3e:4b:0e:2d:c1:43:72:2e:e0:07:dc:49:1a:a6:67: 07:7f:62:58:9e:aa:89:ae:24:74:9b:2a:04:10:3b:83: 94:97:76:10:ce:16:53:c5:46:6b:49:18:fd:85:88:af: cb:64:34:75:99:c5:b1:d3:d4:da:bf:84:44:21:07:d1: 52:cd:89:44:5e:34:5b:75:81:ec:55:ab:d2:8d:a6:af: 2d:07:47:82:f7:7c:3c:84:38:12:cb:df:be:3a:45:cc: 89:41:95:6a:72:0e:63:50:b0:6d:f3:2c:24:79:7f:a9: a4:92:3f:0d:ee:c4:81:59:75:b6:fe:12:6f:4a:a5:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4c:c9:81:a8:d2:d2:c1:7a:5f:79:b4:3f:81:e2:5b:fd: 6a:32:ee:a4:e6:1a:9d:59:e0:ef:3f:52:4b:67:ff:83: 43:6f:72:88:88:2f:3e:cc:3b:c1:7d:1c:7c:0b:c7:d4: 7b:7a:0b:11:e3:80:17:24:2d:a0:22:79:45:e4:72:4a: e2:bf:69:be:0f:f6:c8:79:64:30:54:a8:0a:af:70:1e: 33:a6:bf:39:40:8d:a2:d2:91:2c:21:33:70:43:0c:34: ac:23:cc:61:64:21:31:58:ee:8b:f4:38:87:6e:3f:1b: bb:27:6b:95:70:fb:d7:c3:96:ed:b3:cf:5f:b0:ee:73 Fingerprint (MD5): 79:B8:0A:A9:EB:78:A1:18:F9:84:1C:34:44:69:99:25 Fingerprint (SHA1): 54:0B:D7:D7:03:9F:7B:B0:02:5F:C6:71:7E:82:B0:45:74:42:E1:BB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5201: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5202: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175347 (0x13710a73) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:45 2012 Not After : Sun Mar 26 21:53:45 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:db:3b:eb:8c:46:d9:1a:2c:58:f0:6f:18:be:93:c1: 1d:2e:88:3b:1a:51:42:d6:45:89:7b:7f:e5:10:01:5e: d2:9d:54:aa:03:b7:d6:05:8d:5f:44:be:d5:2a:0c:2a: 99:28:c7:15:a2:7b:3c:82:6a:2d:db:e9:d0:a8:ac:3e: ef:5b:9f:a6:89:0d:91:94:b6:e3:fe:94:be:ca:1d:2f: 6a:3b:09:aa:59:d2:27:82:a0:ef:29:f6:32:c3:69:0f: a2:3e:03:a1:80:97:22:7b:93:3c:eb:a9:1c:84:6c:97: c0:16:6d:5f:2b:01:12:8a:1e:90:6d:2a:9b:3e:2c:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2a:f8:97:2f:3c:82:65:a9:62:c7:a7:14:07:72:b2:6f: 01:fd:e4:1a:7f:4d:82:f4:73:54:f3:c7:e0:73:30:7a: 60:86:1f:5c:0e:ce:a1:2e:22:d3:f9:07:41:bb:44:78: b6:b8:94:18:6f:40:f9:b3:44:c3:5b:b2:cd:b0:fc:28: 60:3a:04:b8:9e:52:5e:aa:a9:f7:21:c7:72:92:32:52: d8:73:26:35:af:c5:50:4b:b6:02:9e:d1:5a:5e:93:d5: e3:7a:42:92:0b:a4:8e:b7:54:28:0d:a7:89:ad:86:d2: 4b:f8:1f:91:af:a6:7a:83:d7:c3:ad:41:a6:41:13:e1 Fingerprint (MD5): 9E:2E:DD:E1:F4:91:25:CF:1F:6D:D4:64:F1:80:BC:0A Fingerprint (SHA1): 2F:DB:96:A2:AF:D7:3D:0C:DB:03:C3:9D:E4:4F:3D:A5:20:A6:2B:2B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5203: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5204: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175348 (0x13710a74) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:53:46 2012 Not After : Sun Mar 26 21:53:46 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:6d:1e:14:b9:25:f4:d9:8c:72:8d:a8:1e:d2:2e:27: b9:85:2d:f8:7d:5c:d3:c4:3d:8a:2d:bc:4a:e2:3e:54: 04:f6:89:6b:ed:cf:f9:d4:6a:2e:8b:be:76:ed:f0:72: 71:bc:17:71:f1:63:ad:b9:83:b6:e9:ba:4c:a3:c7:0d: 88:02:dd:a6:d4:e9:d7:db:02:58:a4:9c:ec:75:4c:34: f6:60:06:51:2c:4f:c9:d2:32:07:25:d5:f9:a5:1f:be: 91:d6:1e:f9:6f:3a:6a:3c:6e:32:75:47:5b:bb:33:63: 15:bc:95:d2:f4:76:0c:68:12:06:2e:85:45:94:6e:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:fc:3b:25:81:2f:98:a0:68:a7:d7:b5:f5:9c:f2:21: 2a:7a:b2:da:50:c6:e6:20:db:f3:75:7f:50:a5:cd:c9: 92:a5:c4:1a:57:1f:7c:ba:c7:4c:84:d7:11:aa:a0:7d: d8:bd:90:1d:4f:bc:95:7d:36:31:81:4a:7c:1b:18:32: e3:0c:7a:51:73:71:9f:0c:87:72:2f:e3:47:cb:92:0c: 15:43:4d:3a:3f:6e:dd:12:15:e4:43:13:e5:11:f0:ef: 25:23:46:8c:02:c7:ea:8c:48:73:76:b0:84:3b:30:99: b9:64:b8:3b:34:4e:8c:44:37:84:db:37:6e:72:7b:57 Fingerprint (MD5): E7:65:C3:38:74:0E:67:55:1A:AC:E5:E2:73:94:D1:E7 Fingerprint (SHA1): EE:9B:32:66:F0:89:B9:FE:55:55:E0:FB:A8:ED:D3:90:ED:61:1A:6E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5205: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5206: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5207: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175350 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5208: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5209: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5210: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5211: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175351 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5212: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5213: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5214: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5215: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326175352 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5216: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5217: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5218: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5219: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326175353 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5220: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #5221: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5222: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5223: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326175354 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5224: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #5225: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5226: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175350 (0x13710a76) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:51 2012 Not After : Sun Mar 26 21:53:51 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:01:03:a4:6b:3d:55:3c:ec:b7:8d:c5:da:bb:23:e0: cd:da:4f:b6:9c:de:ed:bd:2e:7e:63:50:15:f7:3f:91: 60:e2:79:78:15:10:bf:95:33:e8:b2:9f:dc:53:ef:ea: 04:9c:17:e4:ed:41:7e:13:3a:d4:ec:35:58:d8:fa:e4: f7:2e:2e:aa:bb:69:39:e7:17:2f:fe:d0:c6:cf:45:a9: ab:8d:ab:a7:61:c2:bd:60:63:37:60:ff:b8:e1:27:82: 02:60:17:75:0c:69:06:6e:d7:c0:d5:69:fa:65:96:4c: c0:c6:4f:cb:04:fb:64:aa:b5:22:8b:61:2b:6b:28:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 12:41:34:96:0f:d5:52:41:04:c2:bb:6a:1e:b0:70:4b: 5d:69:71:11:bf:cc:b0:c3:cf:8c:34:bc:9e:69:db:85: e1:a5:60:da:0e:5a:4c:9b:a5:9b:86:28:1a:74:07:c5: 59:36:72:3d:47:55:ae:5d:7b:5e:1b:71:64:71:ad:75: db:fb:62:b4:a1:09:50:ba:7d:83:b1:f0:35:d9:7c:a3: e5:dd:8c:3a:c5:36:c8:46:c5:ba:bc:5e:a7:7d:8c:f2: 7e:a1:83:98:a3:25:7b:b9:dc:a2:b5:2a:85:a1:49:b0: 88:3b:fc:f1:36:92:ba:aa:c3:37:5a:cb:cb:9d:ce:90 Fingerprint (MD5): 58:A6:D0:11:9E:BA:7E:23:FD:E8:10:28:92:7B:4E:64 Fingerprint (SHA1): 4E:67:50:A6:5A:DF:47:D9:54:C9:3D:83:48:CF:53:AA:F8:92:EF:1A Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5227: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5228: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175351 (0x13710a77) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:52 2012 Not After : Sun Mar 26 21:53:52 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:3a:5a:86:74:1d:f4:13:35:85:d9:6c:f3:0b:f3:2c: 20:68:97:95:34:a2:30:1c:54:17:78:d4:2f:1c:5c:a4: 97:c8:41:86:ae:0d:a9:db:22:9c:56:b5:9a:18:33:e3: 61:d9:3f:55:3d:16:1e:66:6c:a7:c9:d3:6f:15:46:2f: ba:9d:39:bb:6e:47:19:0e:5d:79:19:b4:95:62:d6:cc: d5:35:b0:c1:44:75:d2:ed:b9:28:5b:2b:73:aa:a1:61: 46:cd:d6:83:83:d0:a9:88:e8:af:3f:8f:49:24:d4:07: 28:e8:83:b0:9f:40:81:47:02:60:98:13:96:e0:9d:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 09:11:7d:ed:22:4a:4e:94:36:b6:79:27:f9:c5:35:8c: f6:ec:c7:f9:52:a3:fb:75:80:14:b3:7c:89:3e:5d:04: 08:27:1d:47:af:94:39:f0:da:47:f9:96:01:00:03:2e: 6f:26:5d:2b:cf:0c:b1:7a:13:00:0e:51:4b:19:8f:4c: 8b:2b:ea:44:c5:b3:6b:b3:34:59:01:7b:0e:07:60:16: e0:73:07:03:af:b5:bb:d1:46:58:be:90:2f:ff:74:21: 0e:d0:3a:f2:a3:3d:e4:92:81:a7:23:ff:a9:bc:70:b5: 80:54:bd:7c:e7:16:8b:21:95:84:6b:e8:64:0f:92:ae Fingerprint (MD5): 31:3E:9B:59:ED:90:62:C7:F6:AE:A3:01:41:E6:82:DF Fingerprint (SHA1): 62:AD:85:75:90:19:04:C5:CC:F2:CC:88:C6:62:41:65:55:46:1B:98 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5229: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5230: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175352 (0x13710a78) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:53:53 2012 Not After : Sun Mar 26 21:53:53 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:ed:7d:62:b8:78:e3:3a:28:94:a2:7d:32:de:7f:ec: 0f:27:0a:8a:83:d1:24:72:17:0e:0c:bb:c2:86:0a:d3: b5:1f:78:15:f0:19:4f:15:26:40:d5:8b:52:7e:4e:d9: 53:04:bc:95:fd:d6:84:80:cd:c1:15:57:79:9c:28:e1: c8:80:d6:77:51:9d:38:db:73:e5:61:f5:c7:fa:67:12: 23:d5:67:9f:e5:8f:dc:e3:0c:ca:aa:8e:e9:e5:a7:72: 50:5e:2d:f0:9c:89:5e:ff:61:16:60:df:62:f6:ce:8d: 8f:48:97:d2:2c:62:02:43:72:6d:a0:fb:e5:56:0b:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 50:23:c9:f3:ee:19:b2:ef:78:e6:e2:c2:a1:ff:32:1f: 2c:01:69:4d:f8:ec:54:66:d4:cd:e9:35:c7:17:f0:c7: 8e:ad:f1:76:45:ee:a8:c7:09:28:a7:f3:d8:1d:b4:f4: f7:14:1a:8e:c8:ca:52:f9:94:8f:5f:9c:52:59:2b:e0: e4:79:72:37:b4:58:38:e6:5a:9c:7a:81:5c:22:16:c8: 43:56:64:be:ec:10:3a:c0:85:91:db:2a:ce:c5:d2:11: 0a:34:37:0a:41:a4:e5:76:33:6a:5f:0e:d4:9a:9e:e2: 70:8e:fa:96:07:43:eb:a5:76:81:d6:a0:b6:02:f5:f9 Fingerprint (MD5): FB:FC:A1:8B:13:98:E4:0C:15:34:28:90:EA:F6:9C:41 Fingerprint (SHA1): A7:75:30:B9:6C:97:53:0F:78:A6:2F:24:55:1B:70:41:74:A6:E5:6B Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5231: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5232: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5233: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5234: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5235: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175350 (0x13710a76) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:51 2012 Not After : Sun Mar 26 21:53:51 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:01:03:a4:6b:3d:55:3c:ec:b7:8d:c5:da:bb:23:e0: cd:da:4f:b6:9c:de:ed:bd:2e:7e:63:50:15:f7:3f:91: 60:e2:79:78:15:10:bf:95:33:e8:b2:9f:dc:53:ef:ea: 04:9c:17:e4:ed:41:7e:13:3a:d4:ec:35:58:d8:fa:e4: f7:2e:2e:aa:bb:69:39:e7:17:2f:fe:d0:c6:cf:45:a9: ab:8d:ab:a7:61:c2:bd:60:63:37:60:ff:b8:e1:27:82: 02:60:17:75:0c:69:06:6e:d7:c0:d5:69:fa:65:96:4c: c0:c6:4f:cb:04:fb:64:aa:b5:22:8b:61:2b:6b:28:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 12:41:34:96:0f:d5:52:41:04:c2:bb:6a:1e:b0:70:4b: 5d:69:71:11:bf:cc:b0:c3:cf:8c:34:bc:9e:69:db:85: e1:a5:60:da:0e:5a:4c:9b:a5:9b:86:28:1a:74:07:c5: 59:36:72:3d:47:55:ae:5d:7b:5e:1b:71:64:71:ad:75: db:fb:62:b4:a1:09:50:ba:7d:83:b1:f0:35:d9:7c:a3: e5:dd:8c:3a:c5:36:c8:46:c5:ba:bc:5e:a7:7d:8c:f2: 7e:a1:83:98:a3:25:7b:b9:dc:a2:b5:2a:85:a1:49:b0: 88:3b:fc:f1:36:92:ba:aa:c3:37:5a:cb:cb:9d:ce:90 Fingerprint (MD5): 58:A6:D0:11:9E:BA:7E:23:FD:E8:10:28:92:7B:4E:64 Fingerprint (SHA1): 4E:67:50:A6:5A:DF:47:D9:54:C9:3D:83:48:CF:53:AA:F8:92:EF:1A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5236: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5237: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175351 (0x13710a77) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:52 2012 Not After : Sun Mar 26 21:53:52 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:3a:5a:86:74:1d:f4:13:35:85:d9:6c:f3:0b:f3:2c: 20:68:97:95:34:a2:30:1c:54:17:78:d4:2f:1c:5c:a4: 97:c8:41:86:ae:0d:a9:db:22:9c:56:b5:9a:18:33:e3: 61:d9:3f:55:3d:16:1e:66:6c:a7:c9:d3:6f:15:46:2f: ba:9d:39:bb:6e:47:19:0e:5d:79:19:b4:95:62:d6:cc: d5:35:b0:c1:44:75:d2:ed:b9:28:5b:2b:73:aa:a1:61: 46:cd:d6:83:83:d0:a9:88:e8:af:3f:8f:49:24:d4:07: 28:e8:83:b0:9f:40:81:47:02:60:98:13:96:e0:9d:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 09:11:7d:ed:22:4a:4e:94:36:b6:79:27:f9:c5:35:8c: f6:ec:c7:f9:52:a3:fb:75:80:14:b3:7c:89:3e:5d:04: 08:27:1d:47:af:94:39:f0:da:47:f9:96:01:00:03:2e: 6f:26:5d:2b:cf:0c:b1:7a:13:00:0e:51:4b:19:8f:4c: 8b:2b:ea:44:c5:b3:6b:b3:34:59:01:7b:0e:07:60:16: e0:73:07:03:af:b5:bb:d1:46:58:be:90:2f:ff:74:21: 0e:d0:3a:f2:a3:3d:e4:92:81:a7:23:ff:a9:bc:70:b5: 80:54:bd:7c:e7:16:8b:21:95:84:6b:e8:64:0f:92:ae Fingerprint (MD5): 31:3E:9B:59:ED:90:62:C7:F6:AE:A3:01:41:E6:82:DF Fingerprint (SHA1): 62:AD:85:75:90:19:04:C5:CC:F2:CC:88:C6:62:41:65:55:46:1B:98 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5238: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5239: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175352 (0x13710a78) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:53:53 2012 Not After : Sun Mar 26 21:53:53 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:ed:7d:62:b8:78:e3:3a:28:94:a2:7d:32:de:7f:ec: 0f:27:0a:8a:83:d1:24:72:17:0e:0c:bb:c2:86:0a:d3: b5:1f:78:15:f0:19:4f:15:26:40:d5:8b:52:7e:4e:d9: 53:04:bc:95:fd:d6:84:80:cd:c1:15:57:79:9c:28:e1: c8:80:d6:77:51:9d:38:db:73:e5:61:f5:c7:fa:67:12: 23:d5:67:9f:e5:8f:dc:e3:0c:ca:aa:8e:e9:e5:a7:72: 50:5e:2d:f0:9c:89:5e:ff:61:16:60:df:62:f6:ce:8d: 8f:48:97:d2:2c:62:02:43:72:6d:a0:fb:e5:56:0b:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 50:23:c9:f3:ee:19:b2:ef:78:e6:e2:c2:a1:ff:32:1f: 2c:01:69:4d:f8:ec:54:66:d4:cd:e9:35:c7:17:f0:c7: 8e:ad:f1:76:45:ee:a8:c7:09:28:a7:f3:d8:1d:b4:f4: f7:14:1a:8e:c8:ca:52:f9:94:8f:5f:9c:52:59:2b:e0: e4:79:72:37:b4:58:38:e6:5a:9c:7a:81:5c:22:16:c8: 43:56:64:be:ec:10:3a:c0:85:91:db:2a:ce:c5:d2:11: 0a:34:37:0a:41:a4:e5:76:33:6a:5f:0e:d4:9a:9e:e2: 70:8e:fa:96:07:43:eb:a5:76:81:d6:a0:b6:02:f5:f9 Fingerprint (MD5): FB:FC:A1:8B:13:98:E4:0C:15:34:28:90:EA:F6:9C:41 Fingerprint (SHA1): A7:75:30:B9:6C:97:53:0F:78:A6:2F:24:55:1B:70:41:74:A6:E5:6B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5240: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5241: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175350 (0x13710a76) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:51 2012 Not After : Sun Mar 26 21:53:51 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:01:03:a4:6b:3d:55:3c:ec:b7:8d:c5:da:bb:23:e0: cd:da:4f:b6:9c:de:ed:bd:2e:7e:63:50:15:f7:3f:91: 60:e2:79:78:15:10:bf:95:33:e8:b2:9f:dc:53:ef:ea: 04:9c:17:e4:ed:41:7e:13:3a:d4:ec:35:58:d8:fa:e4: f7:2e:2e:aa:bb:69:39:e7:17:2f:fe:d0:c6:cf:45:a9: ab:8d:ab:a7:61:c2:bd:60:63:37:60:ff:b8:e1:27:82: 02:60:17:75:0c:69:06:6e:d7:c0:d5:69:fa:65:96:4c: c0:c6:4f:cb:04:fb:64:aa:b5:22:8b:61:2b:6b:28:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 12:41:34:96:0f:d5:52:41:04:c2:bb:6a:1e:b0:70:4b: 5d:69:71:11:bf:cc:b0:c3:cf:8c:34:bc:9e:69:db:85: e1:a5:60:da:0e:5a:4c:9b:a5:9b:86:28:1a:74:07:c5: 59:36:72:3d:47:55:ae:5d:7b:5e:1b:71:64:71:ad:75: db:fb:62:b4:a1:09:50:ba:7d:83:b1:f0:35:d9:7c:a3: e5:dd:8c:3a:c5:36:c8:46:c5:ba:bc:5e:a7:7d:8c:f2: 7e:a1:83:98:a3:25:7b:b9:dc:a2:b5:2a:85:a1:49:b0: 88:3b:fc:f1:36:92:ba:aa:c3:37:5a:cb:cb:9d:ce:90 Fingerprint (MD5): 58:A6:D0:11:9E:BA:7E:23:FD:E8:10:28:92:7B:4E:64 Fingerprint (SHA1): 4E:67:50:A6:5A:DF:47:D9:54:C9:3D:83:48:CF:53:AA:F8:92:EF:1A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5242: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175350 (0x13710a76) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:51 2012 Not After : Sun Mar 26 21:53:51 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:01:03:a4:6b:3d:55:3c:ec:b7:8d:c5:da:bb:23:e0: cd:da:4f:b6:9c:de:ed:bd:2e:7e:63:50:15:f7:3f:91: 60:e2:79:78:15:10:bf:95:33:e8:b2:9f:dc:53:ef:ea: 04:9c:17:e4:ed:41:7e:13:3a:d4:ec:35:58:d8:fa:e4: f7:2e:2e:aa:bb:69:39:e7:17:2f:fe:d0:c6:cf:45:a9: ab:8d:ab:a7:61:c2:bd:60:63:37:60:ff:b8:e1:27:82: 02:60:17:75:0c:69:06:6e:d7:c0:d5:69:fa:65:96:4c: c0:c6:4f:cb:04:fb:64:aa:b5:22:8b:61:2b:6b:28:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 12:41:34:96:0f:d5:52:41:04:c2:bb:6a:1e:b0:70:4b: 5d:69:71:11:bf:cc:b0:c3:cf:8c:34:bc:9e:69:db:85: e1:a5:60:da:0e:5a:4c:9b:a5:9b:86:28:1a:74:07:c5: 59:36:72:3d:47:55:ae:5d:7b:5e:1b:71:64:71:ad:75: db:fb:62:b4:a1:09:50:ba:7d:83:b1:f0:35:d9:7c:a3: e5:dd:8c:3a:c5:36:c8:46:c5:ba:bc:5e:a7:7d:8c:f2: 7e:a1:83:98:a3:25:7b:b9:dc:a2:b5:2a:85:a1:49:b0: 88:3b:fc:f1:36:92:ba:aa:c3:37:5a:cb:cb:9d:ce:90 Fingerprint (MD5): 58:A6:D0:11:9E:BA:7E:23:FD:E8:10:28:92:7B:4E:64 Fingerprint (SHA1): 4E:67:50:A6:5A:DF:47:D9:54:C9:3D:83:48:CF:53:AA:F8:92:EF:1A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5243: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175351 (0x13710a77) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:52 2012 Not After : Sun Mar 26 21:53:52 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:3a:5a:86:74:1d:f4:13:35:85:d9:6c:f3:0b:f3:2c: 20:68:97:95:34:a2:30:1c:54:17:78:d4:2f:1c:5c:a4: 97:c8:41:86:ae:0d:a9:db:22:9c:56:b5:9a:18:33:e3: 61:d9:3f:55:3d:16:1e:66:6c:a7:c9:d3:6f:15:46:2f: ba:9d:39:bb:6e:47:19:0e:5d:79:19:b4:95:62:d6:cc: d5:35:b0:c1:44:75:d2:ed:b9:28:5b:2b:73:aa:a1:61: 46:cd:d6:83:83:d0:a9:88:e8:af:3f:8f:49:24:d4:07: 28:e8:83:b0:9f:40:81:47:02:60:98:13:96:e0:9d:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 09:11:7d:ed:22:4a:4e:94:36:b6:79:27:f9:c5:35:8c: f6:ec:c7:f9:52:a3:fb:75:80:14:b3:7c:89:3e:5d:04: 08:27:1d:47:af:94:39:f0:da:47:f9:96:01:00:03:2e: 6f:26:5d:2b:cf:0c:b1:7a:13:00:0e:51:4b:19:8f:4c: 8b:2b:ea:44:c5:b3:6b:b3:34:59:01:7b:0e:07:60:16: e0:73:07:03:af:b5:bb:d1:46:58:be:90:2f:ff:74:21: 0e:d0:3a:f2:a3:3d:e4:92:81:a7:23:ff:a9:bc:70:b5: 80:54:bd:7c:e7:16:8b:21:95:84:6b:e8:64:0f:92:ae Fingerprint (MD5): 31:3E:9B:59:ED:90:62:C7:F6:AE:A3:01:41:E6:82:DF Fingerprint (SHA1): 62:AD:85:75:90:19:04:C5:CC:F2:CC:88:C6:62:41:65:55:46:1B:98 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5244: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175351 (0x13710a77) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:53:52 2012 Not After : Sun Mar 26 21:53:52 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:3a:5a:86:74:1d:f4:13:35:85:d9:6c:f3:0b:f3:2c: 20:68:97:95:34:a2:30:1c:54:17:78:d4:2f:1c:5c:a4: 97:c8:41:86:ae:0d:a9:db:22:9c:56:b5:9a:18:33:e3: 61:d9:3f:55:3d:16:1e:66:6c:a7:c9:d3:6f:15:46:2f: ba:9d:39:bb:6e:47:19:0e:5d:79:19:b4:95:62:d6:cc: d5:35:b0:c1:44:75:d2:ed:b9:28:5b:2b:73:aa:a1:61: 46:cd:d6:83:83:d0:a9:88:e8:af:3f:8f:49:24:d4:07: 28:e8:83:b0:9f:40:81:47:02:60:98:13:96:e0:9d:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 09:11:7d:ed:22:4a:4e:94:36:b6:79:27:f9:c5:35:8c: f6:ec:c7:f9:52:a3:fb:75:80:14:b3:7c:89:3e:5d:04: 08:27:1d:47:af:94:39:f0:da:47:f9:96:01:00:03:2e: 6f:26:5d:2b:cf:0c:b1:7a:13:00:0e:51:4b:19:8f:4c: 8b:2b:ea:44:c5:b3:6b:b3:34:59:01:7b:0e:07:60:16: e0:73:07:03:af:b5:bb:d1:46:58:be:90:2f:ff:74:21: 0e:d0:3a:f2:a3:3d:e4:92:81:a7:23:ff:a9:bc:70:b5: 80:54:bd:7c:e7:16:8b:21:95:84:6b:e8:64:0f:92:ae Fingerprint (MD5): 31:3E:9B:59:ED:90:62:C7:F6:AE:A3:01:41:E6:82:DF Fingerprint (SHA1): 62:AD:85:75:90:19:04:C5:CC:F2:CC:88:C6:62:41:65:55:46:1B:98 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5245: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175352 (0x13710a78) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:53:53 2012 Not After : Sun Mar 26 21:53:53 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:ed:7d:62:b8:78:e3:3a:28:94:a2:7d:32:de:7f:ec: 0f:27:0a:8a:83:d1:24:72:17:0e:0c:bb:c2:86:0a:d3: b5:1f:78:15:f0:19:4f:15:26:40:d5:8b:52:7e:4e:d9: 53:04:bc:95:fd:d6:84:80:cd:c1:15:57:79:9c:28:e1: c8:80:d6:77:51:9d:38:db:73:e5:61:f5:c7:fa:67:12: 23:d5:67:9f:e5:8f:dc:e3:0c:ca:aa:8e:e9:e5:a7:72: 50:5e:2d:f0:9c:89:5e:ff:61:16:60:df:62:f6:ce:8d: 8f:48:97:d2:2c:62:02:43:72:6d:a0:fb:e5:56:0b:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 50:23:c9:f3:ee:19:b2:ef:78:e6:e2:c2:a1:ff:32:1f: 2c:01:69:4d:f8:ec:54:66:d4:cd:e9:35:c7:17:f0:c7: 8e:ad:f1:76:45:ee:a8:c7:09:28:a7:f3:d8:1d:b4:f4: f7:14:1a:8e:c8:ca:52:f9:94:8f:5f:9c:52:59:2b:e0: e4:79:72:37:b4:58:38:e6:5a:9c:7a:81:5c:22:16:c8: 43:56:64:be:ec:10:3a:c0:85:91:db:2a:ce:c5:d2:11: 0a:34:37:0a:41:a4:e5:76:33:6a:5f:0e:d4:9a:9e:e2: 70:8e:fa:96:07:43:eb:a5:76:81:d6:a0:b6:02:f5:f9 Fingerprint (MD5): FB:FC:A1:8B:13:98:E4:0C:15:34:28:90:EA:F6:9C:41 Fingerprint (SHA1): A7:75:30:B9:6C:97:53:0F:78:A6:2F:24:55:1B:70:41:74:A6:E5:6B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5246: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175352 (0x13710a78) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:53:53 2012 Not After : Sun Mar 26 21:53:53 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:ed:7d:62:b8:78:e3:3a:28:94:a2:7d:32:de:7f:ec: 0f:27:0a:8a:83:d1:24:72:17:0e:0c:bb:c2:86:0a:d3: b5:1f:78:15:f0:19:4f:15:26:40:d5:8b:52:7e:4e:d9: 53:04:bc:95:fd:d6:84:80:cd:c1:15:57:79:9c:28:e1: c8:80:d6:77:51:9d:38:db:73:e5:61:f5:c7:fa:67:12: 23:d5:67:9f:e5:8f:dc:e3:0c:ca:aa:8e:e9:e5:a7:72: 50:5e:2d:f0:9c:89:5e:ff:61:16:60:df:62:f6:ce:8d: 8f:48:97:d2:2c:62:02:43:72:6d:a0:fb:e5:56:0b:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 50:23:c9:f3:ee:19:b2:ef:78:e6:e2:c2:a1:ff:32:1f: 2c:01:69:4d:f8:ec:54:66:d4:cd:e9:35:c7:17:f0:c7: 8e:ad:f1:76:45:ee:a8:c7:09:28:a7:f3:d8:1d:b4:f4: f7:14:1a:8e:c8:ca:52:f9:94:8f:5f:9c:52:59:2b:e0: e4:79:72:37:b4:58:38:e6:5a:9c:7a:81:5c:22:16:c8: 43:56:64:be:ec:10:3a:c0:85:91:db:2a:ce:c5:d2:11: 0a:34:37:0a:41:a4:e5:76:33:6a:5f:0e:d4:9a:9e:e2: 70:8e:fa:96:07:43:eb:a5:76:81:d6:a0:b6:02:f5:f9 Fingerprint (MD5): FB:FC:A1:8B:13:98:E4:0C:15:34:28:90:EA:F6:9C:41 Fingerprint (SHA1): A7:75:30:B9:6C:97:53:0F:78:A6:2F:24:55:1B:70:41:74:A6:E5:6B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5247: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5248: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175355 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5249: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5250: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5251: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5252: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326175356 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5253: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #5254: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5255: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5256: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326175357 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5257: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5258: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5259: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5260: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 326175358 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5261: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der chains.sh: #5262: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5263: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5264: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326175359 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5265: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #5266: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5267: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5268: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326175360 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5269: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #5270: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #5271: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5272: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 326175361 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5273: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der chains.sh: #5274: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5275: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #5276: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #5277: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5278: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #5279: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175355 (0x13710a7b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:53:58 2012 Not After : Sun Mar 26 21:53:58 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:e7:99:2b:9d:8f:e6:81:ef:47:5c:69:1b:4a:c2:74: 44:cb:8b:3a:c3:32:86:32:bf:4a:73:22:dc:7b:72:ad: 65:10:43:c7:8f:70:cb:89:b6:22:0a:19:0f:c4:5b:2d: 63:fd:e3:5e:38:02:4d:70:38:1d:e1:8f:1e:ba:54:c3: f6:4d:13:7a:e3:d7:8d:d5:28:94:07:9e:f0:05:49:7a: e8:e6:8b:5e:c9:41:bd:a8:9a:51:73:0c:7d:86:1a:eb: c5:de:6c:8c:78:76:63:00:5f:9c:3e:6e:59:2e:04:c2: 8b:36:c6:8d:02:cc:33:1d:62:9c:1c:50:50:38:6c:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 48:84:d2:4e:37:29:93:e3:c2:25:b5:7d:7b:6c:1f:f7: 01:d1:93:13:08:2d:68:b6:fa:c1:7d:e6:a8:48:25:07: 54:fe:b2:9f:76:b9:7b:8a:b2:ef:54:18:1b:f3:09:c2: 29:b9:04:ff:fd:51:73:6c:ad:9d:16:84:7b:7d:3a:16: 91:c3:21:23:92:e7:68:d2:00:8e:12:a1:43:ba:b1:d4: 4f:ba:09:b0:b3:ab:33:19:b6:86:77:6d:5d:29:a4:42: 11:b3:a5:03:1a:d1:5b:b6:ce:11:15:4f:f1:12:92:da: e0:f8:30:4f:78:01:aa:18:30:0b:c8:6b:be:1b:e2:64 Fingerprint (MD5): 9A:34:F4:22:87:52:0B:01:82:D9:58:BB:A8:94:3D:F1 Fingerprint (SHA1): 2E:4F:E5:E7:0C:17:2C:BC:5E:1B:77:07:ED:2E:A6:8E:0A:EA:B0:50 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5280: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5281: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5282: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5283: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175355 (0x13710a7b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:53:58 2012 Not After : Sun Mar 26 21:53:58 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:e7:99:2b:9d:8f:e6:81:ef:47:5c:69:1b:4a:c2:74: 44:cb:8b:3a:c3:32:86:32:bf:4a:73:22:dc:7b:72:ad: 65:10:43:c7:8f:70:cb:89:b6:22:0a:19:0f:c4:5b:2d: 63:fd:e3:5e:38:02:4d:70:38:1d:e1:8f:1e:ba:54:c3: f6:4d:13:7a:e3:d7:8d:d5:28:94:07:9e:f0:05:49:7a: e8:e6:8b:5e:c9:41:bd:a8:9a:51:73:0c:7d:86:1a:eb: c5:de:6c:8c:78:76:63:00:5f:9c:3e:6e:59:2e:04:c2: 8b:36:c6:8d:02:cc:33:1d:62:9c:1c:50:50:38:6c:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 48:84:d2:4e:37:29:93:e3:c2:25:b5:7d:7b:6c:1f:f7: 01:d1:93:13:08:2d:68:b6:fa:c1:7d:e6:a8:48:25:07: 54:fe:b2:9f:76:b9:7b:8a:b2:ef:54:18:1b:f3:09:c2: 29:b9:04:ff:fd:51:73:6c:ad:9d:16:84:7b:7d:3a:16: 91:c3:21:23:92:e7:68:d2:00:8e:12:a1:43:ba:b1:d4: 4f:ba:09:b0:b3:ab:33:19:b6:86:77:6d:5d:29:a4:42: 11:b3:a5:03:1a:d1:5b:b6:ce:11:15:4f:f1:12:92:da: e0:f8:30:4f:78:01:aa:18:30:0b:c8:6b:be:1b:e2:64 Fingerprint (MD5): 9A:34:F4:22:87:52:0B:01:82:D9:58:BB:A8:94:3D:F1 Fingerprint (SHA1): 2E:4F:E5:E7:0C:17:2C:BC:5E:1B:77:07:ED:2E:A6:8E:0A:EA:B0:50 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5284: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5285: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5286: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175362 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5287: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5288: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5289: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5290: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326175363 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5291: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #5292: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #5293: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 326175364 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5295: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der chains.sh: #5296: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #5297: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 326175365 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5299: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der chains.sh: #5300: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5301: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5302: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 326175366 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5303: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der chains.sh: #5304: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #5305: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 326175367 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5307: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der chains.sh: #5308: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #5309: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 326175368 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5311: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der chains.sh: #5312: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5313: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5314: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 326175369 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5315: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der chains.sh: #5316: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #5317: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 326175370 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5319: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der chains.sh: #5320: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #5321: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 326175371 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5323: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der chains.sh: #5324: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5325: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5326: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 326175372 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5327: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der chains.sh: #5328: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #5329: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 326175373 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5331: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der chains.sh: #5332: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #5333: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 326175374 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5335: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der chains.sh: #5336: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5337: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5338: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 326175375 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5339: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der chains.sh: #5340: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #5341: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 326175376 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5343: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der chains.sh: #5344: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #5345: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5346: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 326175377 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5347: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der chains.sh: #5348: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #5349: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5350: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 326175378 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5351: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der chains.sh: #5352: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #5353: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5354: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 326175379 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5355: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der chains.sh: #5356: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #5357: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 326175380 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5359: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der chains.sh: #5360: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #5361: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5362: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 326175381 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5363: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der chains.sh: #5364: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #5365: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 326175382 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5367: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der chains.sh: #5368: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #5369: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5370: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 326175383 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5371: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der chains.sh: #5372: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #5373: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 326175384 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5375: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der chains.sh: #5376: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #5377: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5378: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 326175385 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5379: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der chains.sh: #5380: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #5381: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5382: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 326175386 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5383: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der chains.sh: #5384: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #5385: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5386: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 326175387 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5387: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der chains.sh: #5388: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #5389: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5390: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 326175388 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5391: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der chains.sh: #5392: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #5393: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5394: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 326175389 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5395: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der chains.sh: #5396: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #5397: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5398: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 326175390 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5399: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der chains.sh: #5400: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #5401: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5402: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 326175391 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5403: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der chains.sh: #5404: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5405: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5406: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5407: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5408: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5409: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5410: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5411: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5412: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5413: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5414: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5415: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5416: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5417: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5418: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5419: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5420: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5421: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5422: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5423: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5424: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5425: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5426: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5427: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175362 (0x13710a82) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:54:07 2012 Not After : Sun Mar 26 21:54:07 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cb:3d:f9:01:5a:d5:1e:d5:82:1f:f8:45:b3:e8:e3: 8c:c7:22:26:8e:bd:15:bc:98:ae:0f:fb:34:b7:60:6c: 66:34:55:4a:44:cd:fd:4d:fc:c0:40:d6:32:7d:7d:95: 69:59:cf:18:6c:51:83:34:cf:cc:23:78:34:60:e3:5a: 8c:9e:83:f9:ba:16:3c:54:7f:ec:86:10:1c:8a:0d:33: 89:6c:57:70:5f:e0:41:44:07:ec:d1:2a:c9:f7:a7:ed: d1:2b:cd:7d:e5:fa:0e:01:aa:e8:64:cf:17:6d:a2:79: b9:21:e7:b4:79:51:2d:66:8c:2b:cd:6d:ef:2c:c5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:68:9f:d9:44:33:bf:4c:0f:20:3e:ae:0a:dc:77:99: 10:35:c5:6a:cb:cc:44:75:8e:3a:f4:41:06:38:83:00: 13:f3:ec:f4:22:55:03:3e:05:63:23:db:e0:0e:84:18: 6b:33:16:95:04:97:32:48:0c:21:7d:70:55:f0:80:44: ed:f7:f0:3d:c3:c0:71:20:78:2d:c4:25:72:43:56:b4: 49:3b:5c:97:56:11:6c:2e:25:4a:21:d4:87:d0:2a:97: bf:1c:08:8d:1d:01:ff:61:a1:7c:f1:54:c1:45:e2:26: 6b:3e:be:25:d0:7d:8d:b6:62:5c:43:e5:cd:14:32:cd Fingerprint (MD5): 5E:80:C8:53:80:17:EF:FE:E0:82:8B:BE:5C:CF:26:12 Fingerprint (SHA1): C7:F2:52:89:3C:21:ED:F6:83:03:E5:6F:A1:BA:AC:24:EB:6D:3E:F9 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5428: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5429: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5430: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175392 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5431: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5432: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #5433: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5434: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 326175393 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5435: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der chains.sh: #5436: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #5437: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5438: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 326175394 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5439: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der chains.sh: #5440: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #5441: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5442: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 326175395 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5443: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der chains.sh: #5444: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #5445: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5446: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 326175396 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5447: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der chains.sh: #5448: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #5449: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5450: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 326175397 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5451: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der chains.sh: #5452: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #5453: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5454: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 326175398 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5455: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der chains.sh: #5456: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5457: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175392 (0x13710aa0) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:54:41 2012 Not After : Sun Mar 26 21:54:41 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:e6:4a:61:1e:6c:a4:28:dd:4e:c0:9f:71:63:11:45: 6a:ac:e3:e0:d5:43:33:ac:1f:c3:44:46:46:48:4d:38: 2f:de:f0:de:4b:52:11:ce:fc:2a:40:5d:93:c6:ab:10: 0a:e7:c0:3a:c2:5d:3c:e7:c9:a8:33:bf:44:86:35:47: d1:83:53:51:bf:69:c3:21:f2:30:04:9a:67:5c:c9:4c: 9d:f7:ee:10:d5:6a:d8:3e:20:65:5d:bb:5e:d4:cb:7a: 36:db:fd:96:34:97:45:ff:66:74:2f:2a:b5:bb:77:94: b4:96:40:b9:ab:6c:c2:0e:7e:6d:24:b2:b1:c2:46:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: e0:a6:78:e2:b1:5c:b7:b2:f5:8a:b6:49:15:73:57:1c: 75:a3:5e:bf:98:6e:8a:6a:7a:31:8e:3d:2f:10:d2:a0: b3:f0:39:5a:54:44:5e:26:bd:d0:a6:c2:c4:0f:2a:54: 68:51:f8:75:a7:a9:4c:af:01:c8:79:2c:14:35:5f:49: 29:45:7c:04:bc:cc:1b:ba:a1:98:b9:60:72:48:93:3c: 0f:36:74:e8:77:79:2c:38:10:a6:1e:1e:4e:7d:62:5f: da:32:a3:db:98:a1:3b:44:8e:71:4b:17:ed:b0:53:f6: 38:77:25:8d:af:3e:1a:76:e2:49:54:66:54:2c:e6:19 Fingerprint (MD5): 4E:9A:71:5A:BD:02:5F:7B:8B:85:C6:A3:44:F4:2F:7F Fingerprint (SHA1): FD:AC:61:B8:05:99:39:7D:E7:84:D7:79:48:4B:51:6C:35:C2:55:D4 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5458: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5459: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5460: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5461: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175392 (0x13710aa0) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:54:41 2012 Not After : Sun Mar 26 21:54:41 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:e6:4a:61:1e:6c:a4:28:dd:4e:c0:9f:71:63:11:45: 6a:ac:e3:e0:d5:43:33:ac:1f:c3:44:46:46:48:4d:38: 2f:de:f0:de:4b:52:11:ce:fc:2a:40:5d:93:c6:ab:10: 0a:e7:c0:3a:c2:5d:3c:e7:c9:a8:33:bf:44:86:35:47: d1:83:53:51:bf:69:c3:21:f2:30:04:9a:67:5c:c9:4c: 9d:f7:ee:10:d5:6a:d8:3e:20:65:5d:bb:5e:d4:cb:7a: 36:db:fd:96:34:97:45:ff:66:74:2f:2a:b5:bb:77:94: b4:96:40:b9:ab:6c:c2:0e:7e:6d:24:b2:b1:c2:46:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: e0:a6:78:e2:b1:5c:b7:b2:f5:8a:b6:49:15:73:57:1c: 75:a3:5e:bf:98:6e:8a:6a:7a:31:8e:3d:2f:10:d2:a0: b3:f0:39:5a:54:44:5e:26:bd:d0:a6:c2:c4:0f:2a:54: 68:51:f8:75:a7:a9:4c:af:01:c8:79:2c:14:35:5f:49: 29:45:7c:04:bc:cc:1b:ba:a1:98:b9:60:72:48:93:3c: 0f:36:74:e8:77:79:2c:38:10:a6:1e:1e:4e:7d:62:5f: da:32:a3:db:98:a1:3b:44:8e:71:4b:17:ed:b0:53:f6: 38:77:25:8d:af:3e:1a:76:e2:49:54:66:54:2c:e6:19 Fingerprint (MD5): 4E:9A:71:5A:BD:02:5F:7B:8B:85:C6:A3:44:F4:2F:7F Fingerprint (SHA1): FD:AC:61:B8:05:99:39:7D:E7:84:D7:79:48:4B:51:6C:35:C2:55:D4 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5462: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5463: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5464: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5465: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175399 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5466: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5467: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5468: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5469: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175400 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5470: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5471: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5472: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5473: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326175401 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5474: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5475: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5476: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5477: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326175402 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5478: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #5479: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5480: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5481: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5482: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5483: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175399 (0x13710aa7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:54:50 2012 Not After : Sun Mar 26 21:54:50 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:e4:03:b8:5a:43:35:ee:dd:4e:12:38:64:ec:d0:ca: 3f:c2:b4:f8:38:90:58:7b:db:e0:a7:9e:58:27:68:86: b3:f3:8e:fd:4a:30:db:1e:22:2a:0d:4e:f4:59:08:fa: 8f:59:af:29:4e:85:79:8f:d0:d8:f1:4d:88:5f:eb:61: a3:a7:b1:e0:07:66:b2:f7:43:61:fd:7e:7b:d6:79:e9: 3d:c9:75:76:e9:9c:e2:5d:e9:9f:64:27:ba:92:34:be: a5:7b:21:06:64:70:13:8e:02:34:9b:ec:29:fb:3b:22: 99:ff:3f:1a:d5:83:50:03:2c:b3:39:42:94:88:83:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:da:bf:71:6d:7b:3d:86:45:94:4a:e2:d5:7e:75:9c: 01:a0:3f:01:ac:66:55:6f:22:88:5d:2f:55:bc:ea:c3: ad:84:c4:56:39:bc:30:6e:bc:7a:aa:5e:81:47:c1:68: c0:87:9a:b3:21:a8:15:fd:92:f9:d0:fb:bd:70:43:04: d7:9f:fc:bf:95:50:a4:9b:33:2a:10:5c:79:44:e4:14: 99:32:82:6a:ae:f2:58:f1:f3:96:c1:28:52:e4:53:fa: ab:33:39:2e:ca:8d:54:64:3e:84:a1:f8:48:02:96:7d: af:22:e7:e0:49:a0:15:67:9d:88:d4:5f:54:3e:e1:d1 Fingerprint (MD5): CB:0C:F6:8F:5A:F6:0C:ED:A2:80:F7:A8:F9:51:DE:7D Fingerprint (SHA1): 97:8D:BA:41:FA:D4:4E:78:E1:77:FD:D2:E7:C8:5D:CE:2A:BF:6F:5C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5484: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5485: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5486: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175400 (0x13710aa8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:54:51 2012 Not After : Sun Mar 26 21:54:51 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e2:e4:e2:89:21:14:2a:92:2a:e4:7d:a0:24:b5:95: 65:d7:53:6b:aa:c9:b0:ed:77:ac:94:a9:ae:19:cc:83: 30:b1:5c:60:8f:76:2e:ad:3e:7e:06:19:f9:2a:7e:39: 36:6e:25:26:8a:ec:a6:75:ce:ce:3b:a1:fe:42:9e:00: ab:37:b1:6e:6a:58:a8:1f:9a:ce:46:d1:5a:78:ba:52: b5:d0:cc:e5:d6:16:6a:f6:31:0e:34:09:51:b4:b4:bb: ea:aa:80:04:90:be:17:48:02:32:bd:a6:e8:f2:99:51: 9b:68:4b:45:13:4e:a0:5c:0b:25:de:25:77:66:a1:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:7e:a4:48:f3:b1:bb:76:f7:98:ac:de:f6:bc:9a:93: 8a:c4:57:a6:4f:ce:e9:6f:f4:6b:62:7d:29:bc:1b:8b: 1c:38:e7:3b:fd:21:b5:c3:ab:11:bd:a0:86:f7:2c:b6: fc:a3:c1:c7:ea:03:32:39:7d:60:51:d5:8e:49:96:47: a8:aa:c1:b3:51:c1:d5:20:89:88:35:11:0c:83:ec:9c: da:63:bb:a0:c9:28:11:8c:41:e9:ff:89:9d:6a:84:15: fe:9b:80:76:ae:5c:d2:10:43:05:9c:43:90:5b:57:05: d8:6b:1c:07:23:08:59:4e:34:cc:6e:3c:5c:f3:ad:9a Fingerprint (MD5): A1:5A:D3:B7:17:0A:93:02:87:94:0E:82:AF:C3:17:6C Fingerprint (SHA1): 90:D2:61:B5:21:BF:EE:99:E8:13:9D:BB:B3:E2:7C:C2:69:6D:1C:32 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5487: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5488: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175401 (0x13710aa9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:54:52 2012 Not After : Sun Mar 26 21:54:52 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:79:ec:94:f5:f1:99:73:69:b9:bb:bb:81:a4:e6:4a: 64:3b:82:be:39:49:2e:7a:b5:ef:30:ad:70:aa:f5:03: 95:82:ae:cd:ae:25:de:34:5b:80:5f:20:50:e6:27:42: 94:91:ca:32:11:2b:ac:3d:b1:a5:ab:4a:13:c6:fa:1d: 7b:cb:31:cc:28:e6:62:b0:4d:04:42:18:4e:fe:02:0c: 40:ff:81:c0:09:57:6e:5b:ae:25:5e:81:95:6c:1b:88: 50:f9:b4:a3:34:d3:ab:2d:84:cb:f8:f1:ba:e1:92:01: c2:db:e0:db:be:ca:f5:92:29:b1:75:ea:29:a8:55:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 75:50:7d:d5:df:b5:d4:24:08:f8:68:bc:46:0b:f6:56: e7:34:a9:e4:aa:c7:e4:f1:ed:9f:a6:cb:71:63:5a:f5: 8a:12:69:b4:0b:02:d6:93:21:bd:53:d9:16:f1:9a:57: 5f:77:b2:42:d7:1b:5a:3c:ce:a1:f1:a3:5d:dd:a9:d3: c2:a9:a7:aa:5b:24:cd:70:9c:2a:c1:3e:e3:f6:32:eb: 3d:32:a1:28:aa:79:9c:ee:99:87:83:a1:24:57:bf:9a: 75:5e:31:21:e6:7c:35:7e:73:26:49:ad:cd:33:9e:99: a3:66:12:76:c5:7b:16:21:3d:02:13:28:12:d6:b0:9a Fingerprint (MD5): 23:21:79:41:CD:4E:FD:5D:3B:91:E9:FC:9F:AD:55:E8 Fingerprint (SHA1): 4B:42:93:3D:2A:13:28:A0:C9:89:9B:B1:21:10:06:4A:40:77:7E:64 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5489: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5490: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175403 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5491: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5492: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5493: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5494: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175404 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5495: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5496: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5497: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5498: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326175405 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5499: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5500: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5501: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5502: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 326175406 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5503: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der chains.sh: #5504: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5505: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5506: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 326175407 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5507: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der chains.sh: #5508: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5509: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5510: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5511: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5512: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #5513: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175403 (0x13710aab) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:54:55 2012 Not After : Sun Mar 26 21:54:55 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:90:db:52:da:96:9b:66:ff:de:33:d4:16:8b:75:26: fd:0e:a3:c6:4e:ce:ba:27:0c:7f:5f:8e:28:e0:55:57: 27:2b:1e:cf:63:da:1d:9e:6e:44:65:1c:75:dd:b2:7a: f1:bc:2d:87:75:bb:1a:28:35:56:9b:1a:49:ab:94:ed: 72:77:bb:6d:d1:0a:ad:8c:c6:87:9a:0c:80:0f:77:37: fe:af:53:f4:a4:07:5d:4d:e6:25:d9:ab:a7:72:64:86: 82:b9:fc:24:76:cd:28:ac:ac:83:af:90:fd:2c:71:68: 93:38:0c:4a:68:d0:17:5c:98:44:8c:6c:12:67:8b:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: af:0c:c5:c7:a3:3c:af:13:d6:07:c5:b1:f6:f8:9f:27: df:44:8d:e5:73:3c:e6:a1:b6:f2:88:e2:40:e4:aa:90: 37:dd:56:f9:56:74:bd:ed:90:4e:c5:eb:b5:ef:c0:bf: 14:0b:9a:24:a9:1c:ad:e7:09:12:05:ca:c2:b6:b4:4e: 66:e1:6c:63:24:52:5e:31:1d:1a:eb:ef:f0:c8:23:18: 7a:46:76:39:11:d3:72:5a:0f:b8:a3:fb:50:b7:9d:26: e4:e4:44:86:c1:fe:50:60:e4:1f:d6:a8:88:e4:4a:99: bd:25:8d:01:a1:e8:4b:99:d5:c2:17:c0:1d:77:d2:56 Fingerprint (MD5): 85:F2:52:D7:53:6D:AD:07:3F:C9:64:78:78:9B:87:66 Fingerprint (SHA1): 3C:44:B1:D6:E9:06:6D:08:7C:14:26:8E:89:DA:38:75:70:10:39:9A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5514: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5515: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175404 (0x13710aac) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:54:57 2012 Not After : Sun Mar 26 21:54:57 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:10:83:dc:27:71:9b:e6:65:3b:c9:fd:46:a7:96:4b: 6e:36:a3:68:3f:09:5a:ee:f7:28:1a:a6:22:39:62:34: c7:7a:72:35:c4:ec:df:ea:03:e2:f1:42:6f:f5:d7:82: f6:1a:52:01:78:91:db:13:39:61:ba:22:ea:ee:4c:47: c8:71:c8:f5:c6:3a:90:7f:54:43:8d:54:8e:78:9f:81: c3:59:b3:4d:34:44:70:66:68:86:1d:3a:ed:77:25:71: aa:96:17:b4:aa:3d:0e:21:d6:9c:49:92:ab:3e:fc:bb: de:60:5f:26:75:ef:1a:1f:68:e9:5b:29:2a:63:2f:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 64:42:b2:cc:9f:ee:38:76:48:f8:a4:39:a6:cd:62:33: 82:11:16:89:30:80:01:d1:05:4c:33:bd:87:a1:ec:2d: af:6f:e6:9f:01:a0:61:18:3b:bc:9c:df:07:a8:88:f9: 79:d3:b7:92:07:9b:e9:b6:0d:90:a6:5f:07:1f:8c:d4: 4c:91:fb:9d:d2:b6:8e:62:a1:08:e6:e9:4f:46:9c:ab: ff:af:d2:12:dc:68:dd:07:d2:c6:14:cd:03:ac:ee:83: 86:e8:db:7c:ae:60:66:31:6b:78:68:61:da:00:4b:7f: a8:81:b3:6c:d7:5b:85:b8:20:4c:c9:2d:c8:c7:05:41 Fingerprint (MD5): 5E:EB:C1:2F:F7:77:E8:C1:1D:7E:F3:24:6E:53:A0:32 Fingerprint (SHA1): F3:77:CC:63:33:67:D8:18:7C:2F:92:C2:2A:E3:8C:61:AF:1B:63:3E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5516: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5517: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5518: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175405 (0x13710aad) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:54:58 2012 Not After : Sun Mar 26 21:54:58 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:2f:cb:24:45:3e:67:cc:a1:29:aa:9e:a9:08:4b:ad: 30:f4:a3:34:41:88:94:5b:f7:67:18:65:12:00:7e:1c: e1:64:a5:73:14:24:e9:b2:66:bc:74:c5:6a:b4:bd:c7: ce:9c:ed:19:ae:77:95:5b:09:fd:52:a1:a0:95:b4:3e: 8a:58:83:9b:0b:af:65:bb:50:83:a1:b6:ca:2d:4d:ee: c5:bc:a6:1d:60:ed:88:da:fa:43:e0:b7:6d:8b:8d:8c: 34:94:16:3b:51:ec:df:10:35:92:c3:0d:37:8c:77:b3: f7:bd:d1:45:06:2e:ff:dc:04:68:2b:68:3c:50:27:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 64:40:26:42:18:9c:8b:3e:59:48:d7:b6:a3:a5:8c:5d: 1f:00:7d:3d:c6:b4:53:ec:53:c7:f1:c5:19:7d:a1:b7: 3a:8f:fd:e2:85:ca:53:3e:cf:12:62:3f:af:e6:e2:18: f2:1a:d9:e5:3b:f7:2b:98:76:79:c7:69:62:88:76:24: 47:fa:79:38:8d:8b:bf:2d:c6:02:31:30:c8:26:e5:b7: 8a:9c:3a:9b:f1:53:4b:6a:94:85:79:11:b3:cb:20:19: 52:c1:7a:07:7e:80:68:b4:42:03:3a:ec:6e:5f:d6:ac: f2:24:d2:33:e6:6b:d6:35:17:55:5f:2e:27:fa:5b:86 Fingerprint (MD5): DD:36:97:53:0C:91:8C:63:4F:92:00:A1:4D:47:C9:C6 Fingerprint (SHA1): 4F:6F:9A:83:72:09:22:0B:A2:CF:E1:0A:3E:01:DC:3E:14:AC:39:03 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5519: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5520: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175408 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5521: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5522: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5523: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5524: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175409 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5525: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5526: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5527: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5528: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326175410 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-CA1Root-326175318.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5529: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5530: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5531: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5532: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326175411 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5533: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #5534: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #5535: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5536: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175412 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5537: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5538: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5539: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175413 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5540: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5541: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5542: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5543: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326175414 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5544: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #5545: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326175415 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5546: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #5547: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5548: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5549: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5550: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326175416 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-Bridge-326175319.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5551: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #5552: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5553: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5554: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326175417 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5555: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5556: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5557: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5558: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175418 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5559: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5560: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5561: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175419 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5562: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5563: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5564: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5565: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326175420 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5566: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #5567: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326175421 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5568: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #5569: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5570: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5571: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5572: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326175422 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-Bridge-326175320.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5573: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #5574: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5575: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5576: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326175423 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5577: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5578: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5579: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5580: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326175424 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-BridgeNavy-326175321.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5581: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #5582: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5583: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5584: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326175425 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5585: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #5586: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5587: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5588: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175426 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5589: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5590: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5591: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175427 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5592: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5593: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #5594: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5595: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 326175428 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5596: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der chains.sh: #5597: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #5598: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5599: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 326175429 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5600: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der chains.sh: #5601: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5602: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5603: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 326175430 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5604: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der chains.sh: #5605: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 326175431 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5606: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der chains.sh: #5607: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #5608: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5609: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5610: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326175432 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5611: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #5612: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5613: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5614: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326175433 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5615: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #5616: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5617: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5618: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326175434 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5619: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5620: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5621: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5622: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326175435 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5623: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #5624: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175426 (0x13710ac2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:55:20 2012 Not After : Sun Mar 26 21:55:20 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:91:8a:d2:80:eb:1b:c4:a0:a3:28:ce:4b:15:6c:e3: 82:08:af:2f:d7:56:52:44:a3:43:52:b4:48:77:a7:72: fe:e2:e1:72:1b:d2:77:07:d6:df:42:43:42:f4:c7:3f: 99:b8:b6:a9:c8:e9:be:6e:e5:27:fd:35:6c:1a:d7:d1: 3e:3b:0c:91:c7:85:55:c6:03:6f:fe:64:b6:3d:bf:0d: 19:f1:29:b8:5c:cb:64:e8:5d:b6:02:c5:35:6d:7d:d0: ea:f9:c5:f5:2b:50:e5:32:1c:00:1f:c6:7e:e7:bb:c6: cc:b7:5d:55:44:03:d4:fb:84:51:06:9a:5a:70:fe:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 52:08:a6:80:58:48:ea:e2:16:54:01:9e:18:66:f7:cf: 6c:d8:b5:1c:db:e0:9a:94:d5:dc:84:df:37:23:d0:37: a5:3a:ea:4b:5b:ac:23:aa:da:25:f4:d7:b7:85:05:e1: 81:12:4f:4d:ca:9b:c0:f1:39:87:aa:ad:35:c0:bb:9e: 11:3d:ae:7f:4a:84:c1:c9:1e:6f:42:f4:0a:33:34:9b: 6c:7a:c7:13:e2:c5:d7:32:5a:cd:fe:83:39:f3:a6:63: ff:fe:9d:5e:76:81:35:89:53:de:61:51:af:83:8e:40: a7:e9:d3:92:1d:80:e2:9c:8f:27:33:20:b4:72:84:be Fingerprint (MD5): E6:29:67:F3:DF:31:DA:9B:81:45:17:8D:C4:97:8E:EB Fingerprint (SHA1): 5D:F7:16:D5:28:15:6E:A7:0B:1C:EC:AE:C2:75:CC:4D:80:EA:38:8C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #5626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5628: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5629: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5630: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5631: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5632: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5633: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5634: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175427 (0x13710ac3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:55:21 2012 Not After : Sun Mar 26 21:55:21 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:0d:74:2b:ca:9d:a6:99:48:ff:09:ae:82:d4:e4:a9: c3:19:a8:65:8c:fc:46:a1:cf:9a:a5:2f:6a:18:8a:ce: 34:7a:5e:56:66:7d:91:48:93:10:81:d3:54:18:c7:c7: 72:2f:d7:06:95:d6:12:37:ff:ef:c7:3c:0c:09:e2:1b: ce:a9:b1:85:bb:90:8b:6f:f0:e9:ec:75:35:3a:28:93: ba:b2:9c:f1:b6:09:71:7e:94:d5:79:73:18:6d:a7:d4: d2:20:48:de:a8:57:f1:d6:ad:ab:f3:c2:c1:d4:7c:8e: 83:11:d9:e6:9f:36:cb:24:25:e6:e3:3b:5d:af:c7:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 77:08:d6:fa:c8:ae:19:a4:bd:f8:44:a0:b8:13:54:6a: 03:4e:4f:08:0a:40:6b:46:e5:b7:a0:04:19:e6:66:82: 25:eb:86:9a:e1:83:8d:e0:e2:00:af:b4:f9:45:f6:47: f2:c2:1b:40:43:98:ae:51:11:c0:34:08:e7:81:59:79: da:29:8d:da:1f:8e:60:aa:66:4f:b5:94:28:72:4c:04: 72:aa:18:70:b5:2d:1d:c8:39:96:c5:cc:ee:86:35:84: 75:4b:a4:42:fc:5f:8b:15:6b:a7:15:fc:f1:63:72:22: 3c:66:b7:dc:be:77:a7:e6:ad:66:ad:01:af:db:a1:d6 Fingerprint (MD5): 6A:BF:EE:4D:BE:FC:FE:F1:B7:61:20:EE:77:7F:97:27 Fingerprint (SHA1): FB:D5:92:72:96:90:73:B2:FC:B8:72:C8:0D:5B:9A:A9:F0:5F:8C:D0 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #5635: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5636: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5637: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5638: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5639: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5640: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5641: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #5642: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #5643: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #5644: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #5645: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #5646: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #5647: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #5648: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5649: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5650: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig n, Inc.",C=US" Validity: Not Before: Wed Nov 08 00:00:00 2006 Not After : Sun Nov 07 23:59:59 2021 Subject: "CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve riSign Trust Network,O="VeriSign, Inc.",C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: CRL Distribution Points Distribution point: URI: "http://crl.verisign.com/pca3.crl" Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: OID.1.3.6.1.5.5.7.1.12 Data: Sequence { [1]: { [0]: { Sequence { Sequence { Sequence { "image/gif" Sequence { Sequence { Sequence { SHA-1 } 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: 80:6a:d4:48:18:2c:7b:19:2e } } Sequence { "http://logo.verisign.com/vslogo.gif" } } } } } } } Name: Certificate Policies Data: Policy Name: Certificate Policies AnyPolicy Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Qualifier Data: "https://www.verisign.com/cps" Name: Certificate Subject Key ID Data: 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: af:33:31:33 Name: Certificate Authority Key Identifier Issuer: Directory Name: "OU=Class 3 Public Primary Certification Auth ority,O="VeriSign, Inc.",C=US" Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 Fingerprint (MD5): C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C Fingerprint (SHA1): 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= US,serialNumber=3014267,businessCategory=Private Organization,incorporati onState=Delaware,incorporationCountry=US" Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network ,O="VeriSign, Inc.",C=US" Returned value is 0, expected result is pass chains.sh: #5651: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #5652: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5653: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175436 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5654: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5655: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5656: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5657: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175437 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5658: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5659: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5660: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5661: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326175438 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5662: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5663: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5664: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5665: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 326175439 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5666: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der chains.sh: #5667: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5668: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5669: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326175440 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5670: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #5671: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5672: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5673: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 326175441 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5674: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der chains.sh: #5675: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5676: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5677: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 326175442 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5678: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der chains.sh: #5679: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #5680: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5681: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 326175443 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5682: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der chains.sh: #5683: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5684: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5685: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 326175444 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5686: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der chains.sh: #5687: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5688: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175436 (0x13710acc) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:55:34 2012 Not After : Sun Mar 26 21:55:34 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 67:19:a5:ee:35:d3:02:e3:b9:a5:32:9c:40:9f:79:76: 31:fa:86:0c:0f:9c:57:36:c4:29:be:ff:28:6c:5f:b4: e5:8b:14:ae:7a:21:5e:fb:bd:17:12:73:03:95:6b:23: 8f:82:ae:ef:4c:c0:82:23:67:64:d4:27:24:96:a8:8b: 9e:62:b4:83:06:55:a4:ba:8d:ea:36:92:0c:f9:e9:18: ab:dd:8b:6d:bf:8f:7a:35:f0:a5:88:9a:a5:51:c1:2f: 01:8c:d9:38:76:e8:ed:3a:07:95:42:dc:cc:13:fb:16: 9c:d5:71:a0:1b:34:21:df:d6:1b:7e:0c:25:b1:9b:3a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:18:95:cf:87:3d:aa:5f:a8:84:b1:a4:01: 28:d4:98:3e:0e:c8:94:2d:02:14:06:3f:2b:2b:d7:09: 81:17:3c:a2:50:3e:c8:4d:50:51:a2:44:a5:4d Fingerprint (MD5): 91:DC:A9:F5:92:73:DB:78:CF:1E:26:E3:B6:4D:D0:1B Fingerprint (SHA1): C3:29:1B:DA:B6:78:F6:5C:05:A2:7C:C2:A1:01:A4:5A:CA:1C:CA:9D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5689: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175436 (0x13710acc) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:55:34 2012 Not After : Sun Mar 26 21:55:34 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 67:19:a5:ee:35:d3:02:e3:b9:a5:32:9c:40:9f:79:76: 31:fa:86:0c:0f:9c:57:36:c4:29:be:ff:28:6c:5f:b4: e5:8b:14:ae:7a:21:5e:fb:bd:17:12:73:03:95:6b:23: 8f:82:ae:ef:4c:c0:82:23:67:64:d4:27:24:96:a8:8b: 9e:62:b4:83:06:55:a4:ba:8d:ea:36:92:0c:f9:e9:18: ab:dd:8b:6d:bf:8f:7a:35:f0:a5:88:9a:a5:51:c1:2f: 01:8c:d9:38:76:e8:ed:3a:07:95:42:dc:cc:13:fb:16: 9c:d5:71:a0:1b:34:21:df:d6:1b:7e:0c:25:b1:9b:3a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:18:95:cf:87:3d:aa:5f:a8:84:b1:a4:01: 28:d4:98:3e:0e:c8:94:2d:02:14:06:3f:2b:2b:d7:09: 81:17:3c:a2:50:3e:c8:4d:50:51:a2:44:a5:4d Fingerprint (MD5): 91:DC:A9:F5:92:73:DB:78:CF:1E:26:E3:B6:4D:D0:1B Fingerprint (SHA1): C3:29:1B:DA:B6:78:F6:5C:05:A2:7C:C2:A1:01:A4:5A:CA:1C:CA:9D Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5690: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175436 (0x13710acc) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:55:34 2012 Not After : Sun Mar 26 21:55:34 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 67:19:a5:ee:35:d3:02:e3:b9:a5:32:9c:40:9f:79:76: 31:fa:86:0c:0f:9c:57:36:c4:29:be:ff:28:6c:5f:b4: e5:8b:14:ae:7a:21:5e:fb:bd:17:12:73:03:95:6b:23: 8f:82:ae:ef:4c:c0:82:23:67:64:d4:27:24:96:a8:8b: 9e:62:b4:83:06:55:a4:ba:8d:ea:36:92:0c:f9:e9:18: ab:dd:8b:6d:bf:8f:7a:35:f0:a5:88:9a:a5:51:c1:2f: 01:8c:d9:38:76:e8:ed:3a:07:95:42:dc:cc:13:fb:16: 9c:d5:71:a0:1b:34:21:df:d6:1b:7e:0c:25:b1:9b:3a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:18:95:cf:87:3d:aa:5f:a8:84:b1:a4:01: 28:d4:98:3e:0e:c8:94:2d:02:14:06:3f:2b:2b:d7:09: 81:17:3c:a2:50:3e:c8:4d:50:51:a2:44:a5:4d Fingerprint (MD5): 91:DC:A9:F5:92:73:DB:78:CF:1E:26:E3:B6:4D:D0:1B Fingerprint (SHA1): C3:29:1B:DA:B6:78:F6:5C:05:A2:7C:C2:A1:01:A4:5A:CA:1C:CA:9D Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5691: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175436 (0x13710acc) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:55:34 2012 Not After : Sun Mar 26 21:55:34 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 67:19:a5:ee:35:d3:02:e3:b9:a5:32:9c:40:9f:79:76: 31:fa:86:0c:0f:9c:57:36:c4:29:be:ff:28:6c:5f:b4: e5:8b:14:ae:7a:21:5e:fb:bd:17:12:73:03:95:6b:23: 8f:82:ae:ef:4c:c0:82:23:67:64:d4:27:24:96:a8:8b: 9e:62:b4:83:06:55:a4:ba:8d:ea:36:92:0c:f9:e9:18: ab:dd:8b:6d:bf:8f:7a:35:f0:a5:88:9a:a5:51:c1:2f: 01:8c:d9:38:76:e8:ed:3a:07:95:42:dc:cc:13:fb:16: 9c:d5:71:a0:1b:34:21:df:d6:1b:7e:0c:25:b1:9b:3a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:18:95:cf:87:3d:aa:5f:a8:84:b1:a4:01: 28:d4:98:3e:0e:c8:94:2d:02:14:06:3f:2b:2b:d7:09: 81:17:3c:a2:50:3e:c8:4d:50:51:a2:44:a5:4d Fingerprint (MD5): 91:DC:A9:F5:92:73:DB:78:CF:1E:26:E3:B6:4D:D0:1B Fingerprint (SHA1): C3:29:1B:DA:B6:78:F6:5C:05:A2:7C:C2:A1:01:A4:5A:CA:1C:CA:9D Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #5692: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5693: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5694: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5695: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5696: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5697: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5698: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #5699: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5700: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5701: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5702: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #5703: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5704: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5705: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5706: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #5707: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #5708: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5709: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5710: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der chains.sh: #5711: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5712: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5713: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5714: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #5715: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5716: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5717: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5718: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #5719: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326215550Z nextupdate=20130326215550Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:55:50 2012 Next Update: Tue Mar 26 21:55:50 2013 CRL Extensions: chains.sh: #5720: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215550Z nextupdate=20130326215550Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:55:50 2012 Next Update: Tue Mar 26 21:55:50 2013 CRL Extensions: chains.sh: #5721: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326215550Z nextupdate=20130326215550Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:55:50 2012 Next Update: Tue Mar 26 21:55:50 2013 CRL Extensions: chains.sh: #5722: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326215550Z nextupdate=20130326215550Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:55:50 2012 Next Update: Tue Mar 26 21:55:50 2013 CRL Extensions: chains.sh: #5723: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326215551Z addcert 14 20120326215551Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:55:51 2012 Next Update: Tue Mar 26 21:55:50 2013 Entry (1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 26 21:55:51 2012 CRL Extensions: chains.sh: #5724: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215552Z addcert 15 20120326215552Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:55:52 2012 Next Update: Tue Mar 26 21:55:50 2013 Entry (1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 26 21:55:52 2012 CRL Extensions: chains.sh: #5725: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5726: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5727: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5728: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #5729: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #5730: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #5731: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #5732: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #5733: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #5734: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:55:43 2012 Not After : Sun Mar 26 21:55:43 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:f9:bf:b9:14:b9:ad:a8:2d:5f:15:6d:26:ea:cb:e8: 5d:0d:14:84:26:0a:9a:6f:97:43:ff:97:34:a7:d3:7b: 9a:e3:0c:1a:43:b0:75:96:b7:06:e8:50:65:f6:f4:24: a9:9a:24:e9:d9:2d:13:ed:77:37:44:30:2a:0c:80:df: b8:0c:79:39:14:e7:3d:3c:57:c8:f0:c9:37:48:2a:a7: e7:93:4c:8a:52:1e:b8:b7:17:bf:8c:3b:f4:c2:0c:c1: 73:1a:e1:eb:20:72:24:e2:02:d6:3f:e6:85:f9:75:e1: 0e:52:55:ed:64:0a:fe:ef:14:3a:37:35:73:41:c9:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 75:9c:4f:93:c6:d8:b7:b1:47:f7:0c:ea:9d:07:dc:ce: 16:af:5d:9c:53:ae:f4:3a:0a:4d:fe:38:17:b0:b6:8f: 57:b3:fb:00:87:e2:8b:03:ea:0c:0b:82:8a:a0:ae:f7: 20:e2:9c:29:38:fd:b2:02:e1:d1:1a:8d:0e:3d:aa:0e: 16:38:80:a9:89:58:e0:cd:60:22:2f:c7:d0:cf:a1:e1: 7e:80:23:bb:76:80:f1:fe:32:cf:c6:62:63:87:74:7e: 18:fe:3c:8f:88:aa:35:0d:a6:f6:e6:7c:a0:e5:26:5c: c2:68:ae:57:d8:ea:f4:18:1d:f1:58:c0:ff:1e:0e:19 Fingerprint (MD5): 9C:5D:A4:77:43:88:B8:62:54:50:F2:CA:9E:35:B5:18 Fingerprint (SHA1): FC:BA:87:F6:A4:41:6A:48:68:23:12:BA:7C:D6:7B:C2:BC:9C:53:05 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5735: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5736: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:55:43 2012 Not After : Sun Mar 26 21:55:43 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:f9:bf:b9:14:b9:ad:a8:2d:5f:15:6d:26:ea:cb:e8: 5d:0d:14:84:26:0a:9a:6f:97:43:ff:97:34:a7:d3:7b: 9a:e3:0c:1a:43:b0:75:96:b7:06:e8:50:65:f6:f4:24: a9:9a:24:e9:d9:2d:13:ed:77:37:44:30:2a:0c:80:df: b8:0c:79:39:14:e7:3d:3c:57:c8:f0:c9:37:48:2a:a7: e7:93:4c:8a:52:1e:b8:b7:17:bf:8c:3b:f4:c2:0c:c1: 73:1a:e1:eb:20:72:24:e2:02:d6:3f:e6:85:f9:75:e1: 0e:52:55:ed:64:0a:fe:ef:14:3a:37:35:73:41:c9:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 75:9c:4f:93:c6:d8:b7:b1:47:f7:0c:ea:9d:07:dc:ce: 16:af:5d:9c:53:ae:f4:3a:0a:4d:fe:38:17:b0:b6:8f: 57:b3:fb:00:87:e2:8b:03:ea:0c:0b:82:8a:a0:ae:f7: 20:e2:9c:29:38:fd:b2:02:e1:d1:1a:8d:0e:3d:aa:0e: 16:38:80:a9:89:58:e0:cd:60:22:2f:c7:d0:cf:a1:e1: 7e:80:23:bb:76:80:f1:fe:32:cf:c6:62:63:87:74:7e: 18:fe:3c:8f:88:aa:35:0d:a6:f6:e6:7c:a0:e5:26:5c: c2:68:ae:57:d8:ea:f4:18:1d:f1:58:c0:ff:1e:0e:19 Fingerprint (MD5): 9C:5D:A4:77:43:88:B8:62:54:50:F2:CA:9E:35:B5:18 Fingerprint (SHA1): FC:BA:87:F6:A4:41:6A:48:68:23:12:BA:7C:D6:7B:C2:BC:9C:53:05 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5737: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5738: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED ./chains.sh: line 806: ping: command not found OCSP server not accessible, skipping OCSP tests chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5739: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175445 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5740: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5741: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5742: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5743: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 326175446 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5744: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #5745: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5746: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 /localhost-18664-CA0-326175335.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5747: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326175322.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5748: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #5749: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5750: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-CA0-326175335.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5751: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 326175447 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5752: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #5753: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5754: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 /localhost-18664-CA0-326175335.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5755: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326175323.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5756: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #5757: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5758: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5759: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 326175448 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5760: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #5761: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5762: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-CA0-326175335.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5763: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326175324.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5764: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der chains.sh: #5765: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5766: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-CA0-326175335.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5767: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18664-CA0Root-326175325.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5768: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der chains.sh: #5769: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326215603Z nextupdate=20130326215603Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:56:03 2012 Next Update: Tue Mar 26 21:56:03 2013 CRL Extensions: chains.sh: #5770: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215603Z nextupdate=20130326215603Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:56:03 2012 Next Update: Tue Mar 26 21:56:03 2013 CRL Extensions: chains.sh: #5771: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326215603Z nextupdate=20130326215603Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:56:03 2012 Next Update: Tue Mar 26 21:56:03 2013 CRL Extensions: chains.sh: #5772: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326215603Z nextupdate=20130326215603Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:56:03 2012 Next Update: Tue Mar 26 21:56:03 2013 CRL Extensions: chains.sh: #5773: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215604Z addcert 20 20120326215604Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:56:04 2012 Next Update: Tue Mar 26 21:56:03 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:56:04 2012 CRL Extensions: chains.sh: #5774: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215605Z addcert 40 20120326215605Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:56:05 2012 Next Update: Tue Mar 26 21:56:03 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:56:04 2012 Entry (2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:56:05 2012 CRL Extensions: chains.sh: #5775: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5776: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5777: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5778: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined TIMESTAMP chains END: Mon Mar 26 17:56:06 EDT 2012 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_64=1 NSS_CYCLES="" NSS_TESTS="" NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr" NSS_SSL_RUN="cov auth stress" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= Tests summary: -------------- Passed: 5778 Failed: 0 Failed with core: 0 Unknown status: 0 + cd ../../../../ + killall selfserv_9793 selfserv_9793: no process killed + : ++ grep -c FAILED ./mozilla/tests_results/security/localhost.1/output.log + TEST_FAILURES=0 + : + '[' 0 -ne 0 ']' test suite completed + echo 'test suite completed' + exit 0 Processing files: nss-3.13.3-1.ru6.x86_64 Provides: config(nss) = 3.13.3-1.ru6 libnss3.so()(64bit) libnss3.so(NSS_3.10)(64bit) libnss3.so(NSS_3.10.2)(64bit) libnss3.so(NSS_3.11)(64bit) libnss3.so(NSS_3.11.1)(64bit) libnss3.so(NSS_3.11.2)(64bit) libnss3.so(NSS_3.11.7)(64bit) libnss3.so(NSS_3.11.9)(64bit) libnss3.so(NSS_3.12)(64bit) libnss3.so(NSS_3.12.1)(64bit) libnss3.so(NSS_3.12.10)(64bit) libnss3.so(NSS_3.12.3)(64bit) libnss3.so(NSS_3.12.4)(64bit) libnss3.so(NSS_3.12.5)(64bit) libnss3.so(NSS_3.12.6)(64bit) libnss3.so(NSS_3.12.7)(64bit) libnss3.so(NSS_3.12.9)(64bit) libnss3.so(NSS_3.13)(64bit) libnss3.so(NSS_3.13.2)(64bit) libnss3.so(NSS_3.2)(64bit) libnss3.so(NSS_3.2.1)(64bit) libnss3.so(NSS_3.3)(64bit) libnss3.so(NSS_3.3.1)(64bit) libnss3.so(NSS_3.4)(64bit) libnss3.so(NSS_3.5)(64bit) libnss3.so(NSS_3.6)(64bit) libnss3.so(NSS_3.7)(64bit) libnss3.so(NSS_3.7.1)(64bit) libnss3.so(NSS_3.8)(64bit) libnss3.so(NSS_3.9)(64bit) libnss3.so(NSS_3.9.2)(64bit) libnss3.so(NSS_3.9.3)(64bit) libnssckbi.so()(64bit) libnssckbi.so(NSS_3.1)(64bit) libnsspem.so()(64bit) libnsspem.so(NSS_3.1)(64bit) libsmime3.so()(64bit) libsmime3.so(NSS_3.10)(64bit) libsmime3.so(NSS_3.12.10)(64bit) libsmime3.so(NSS_3.12.2)(64bit) libsmime3.so(NSS_3.13)(64bit) libsmime3.so(NSS_3.2)(64bit) libsmime3.so(NSS_3.2.1)(64bit) libsmime3.so(NSS_3.3)(64bit) libsmime3.so(NSS_3.4)(64bit) libsmime3.so(NSS_3.4.1)(64bit) libsmime3.so(NSS_3.6)(64bit) libsmime3.so(NSS_3.7)(64bit) libsmime3.so(NSS_3.7.2)(64bit) libsmime3.so(NSS_3.8)(64bit) libsmime3.so(NSS_3.9)(64bit) libsmime3.so(NSS_3.9.3)(64bit) libssl3.so()(64bit) libssl3.so(NSS_3.11.4)(64bit) libssl3.so(NSS_3.11.8)(64bit) libssl3.so(NSS_3.12.10)(64bit) libssl3.so(NSS_3.12.6)(64bit) libssl3.so(NSS_3.13)(64bit) libssl3.so(NSS_3.13.2)(64bit) libssl3.so(NSS_3.2)(64bit) libssl3.so(NSS_3.2.1)(64bit) libssl3.so(NSS_3.4)(64bit) libssl3.so(NSS_3.7.4)(64bit) Requires(interp): /sbin/ldconfig /sbin/ldconfig Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): /sbin/ldconfig Requires(postun): /sbin/ldconfig Requires: libc.so.6()(64bit) libc.so.6(GLIBC_2.2.5)(64bit) libc.so.6(GLIBC_2.3)(64bit) libc.so.6(GLIBC_2.3.4)(64bit) libc.so.6(GLIBC_2.4)(64bit) libdl.so.2()(64bit) libfreebl3.so()(64bit) libnspr4.so()(64bit) libnss3.so()(64bit) libnss3.so(NSS_3.10)(64bit) libnss3.so(NSS_3.11)(64bit) libnss3.so(NSS_3.11.1)(64bit) libnss3.so(NSS_3.12)(64bit) libnss3.so(NSS_3.12.6)(64bit) libnss3.so(NSS_3.2)(64bit) libnss3.so(NSS_3.3)(64bit) libnss3.so(NSS_3.3.1)(64bit) libnss3.so(NSS_3.4)(64bit) libnss3.so(NSS_3.6)(64bit) libnss3.so(NSS_3.7)(64bit) libnss3.so(NSS_3.8)(64bit) libnss3.so(NSS_3.9)(64bit) libnss3.so(NSS_3.9.3)(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.12.3)(64bit) libnssutil3.so(NSSUTIL_3.12.5)(64bit) libnssutil3.so(NSSUTIL_3.13)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) libpthread.so.0()(64bit) libpthread.so.0(GLIBC_2.2.5)(64bit) libsoftokn3.so()(64bit) libz.so.1()(64bit) rtld(GNU_HASH) Processing files: nss-tools-3.13.3-1.ru6.x86_64 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: libc.so.6()(64bit) libc.so.6(GLIBC_2.2.5)(64bit) libc.so.6(GLIBC_2.3)(64bit) libc.so.6(GLIBC_2.3.4)(64bit) libc.so.6(GLIBC_2.4)(64bit) libdl.so.2()(64bit) libnspr4.so()(64bit) libnss3.so()(64bit) libnss3.so(NSS_3.10)(64bit) libnss3.so(NSS_3.11)(64bit) libnss3.so(NSS_3.11.7)(64bit) libnss3.so(NSS_3.12)(64bit) libnss3.so(NSS_3.12.1)(64bit) libnss3.so(NSS_3.12.9)(64bit) libnss3.so(NSS_3.13)(64bit) libnss3.so(NSS_3.2)(64bit) libnss3.so(NSS_3.3)(64bit) libnss3.so(NSS_3.4)(64bit) libnss3.so(NSS_3.5)(64bit) libnss3.so(NSS_3.6)(64bit) libnss3.so(NSS_3.7)(64bit) libnss3.so(NSS_3.8)(64bit) libnss3.so(NSS_3.9)(64bit) libnss3.so(NSS_3.9.2)(64bit) libnss3.so(NSS_3.9.3)(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.12.3)(64bit) libnssutil3.so(NSSUTIL_3.12.5)(64bit) libnssutil3.so(NSSUTIL_3.12.7)(64bit) libnssutil3.so(NSSUTIL_3.13)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) libpthread.so.0()(64bit) libpthread.so.0(GLIBC_2.2.5)(64bit) libsmime3.so()(64bit) libsmime3.so(NSS_3.10)(64bit) libsmime3.so(NSS_3.2)(64bit) libsmime3.so(NSS_3.3)(64bit) libsmime3.so(NSS_3.4)(64bit) libsmime3.so(NSS_3.6)(64bit) libsmime3.so(NSS_3.9.3)(64bit) libsqlite3.so.0()(64bit) libssl3.so()(64bit) libssl3.so(NSS_3.11.8)(64bit) libssl3.so(NSS_3.12.6)(64bit) libssl3.so(NSS_3.13.2)(64bit) libssl3.so(NSS_3.2)(64bit) libssl3.so(NSS_3.4)(64bit) libssl3.so(NSS_3.7.4)(64bit) libz.so.1()(64bit) rtld(GNU_HASH) Processing files: nss-sysinit-3.13.3-1.ru6.x86_64 Provides: config(nss-sysinit) = 3.13.3-1.ru6 libnsssysinit.so()(64bit) nss-system-init Requires(interp): /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): coreutils sed Requires: /bin/sh libc.so.6()(64bit) libc.so.6(GLIBC_2.2.5)(64bit) libc.so.6(GLIBC_2.3)(64bit) libdl.so.2()(64bit) libnspr4.so()(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) libpthread.so.0()(64bit) rtld(GNU_HASH) Processing files: nss-devel-3.13.3-1.ru6.x86_64 Provides: nss-static = 3.13.3-1.ru6 pkgconfig(nss) = 3.13.3 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 rpmlib(VersionedDependencies) <= 3.0.3-1 Requires: /bin/sh /usr/bin/pkg-config pkgconfig(nspr) >= 4.9 pkgconfig(nss-util) >= 3.13.3 Processing files: nss-pkcs11-devel-3.13.3-1.ru6.x86_64 Provides: nss-pkcs11-devel-static = 3.13.3-1.ru6 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 rpmlib(VersionedDependencies) <= 3.0.3-1 Processing files: nss-debuginfo-3.13.3-1.ru6.x86_64 Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64 warning: Could not canonicalize hostname: opus5.rutgers.edu Wrote: /builddir/build/RPMS/nss-3.13.3-1.ru6.x86_64.rpm Wrote: /builddir/build/RPMS/nss-tools-3.13.3-1.ru6.x86_64.rpm Wrote: /builddir/build/RPMS/nss-sysinit-3.13.3-1.ru6.x86_64.rpm Wrote: /builddir/build/RPMS/nss-devel-3.13.3-1.ru6.x86_64.rpm Wrote: /builddir/build/RPMS/nss-pkcs11-devel-3.13.3-1.ru6.x86_64.rpm Wrote: /builddir/build/RPMS/nss-debuginfo-3.13.3-1.ru6.x86_64.rpm Executing(%clean): /bin/sh -e /var/tmp/rpm-tmp.OKg6ri + umask 022 + cd /builddir/build/BUILD + cd nss-3.13.3 + /bin/rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.x86_64 + exit 0 Child returncode was: 0 LEAVE do -->